:caif_netlink_parms(): no params data found [ 1457.617757][T27296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1457.625860][T27296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1457.633473][T27296] device bridge_slave_0 entered promiscuous mode [ 1457.902551][T27298] bridge0: port 1(bridge_slave_0) entered blocking state [ 1457.909874][T27298] bridge0: port 1(bridge_slave_0) entered disabled state [ 1457.918047][T27298] device bridge_slave_0 entered promiscuous mode [ 1457.926111][T27296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1457.933177][T27296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1457.941494][T27296] device bridge_slave_1 entered promiscuous mode [ 1457.958365][T27298] bridge0: port 2(bridge_slave_1) entered blocking state [ 1457.966886][T27298] bridge0: port 2(bridge_slave_1) entered disabled state [ 1457.975083][T27298] device bridge_slave_1 entered promiscuous mode [ 1457.999520][T27296] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1458.010836][T27296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1458.030444][T27298] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1458.046706][ T7] device bridge_slave_1 left promiscuous mode [ 1458.052948][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1458.075572][ T7] device bridge_slave_0 left promiscuous mode [ 1458.081739][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1458.145287][ T7] device bridge_slave_1 left promiscuous mode [ 1458.151479][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1458.195787][ T7] device bridge_slave_0 left promiscuous mode [ 1458.202043][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1458.256209][ T7] device bridge_slave_1 left promiscuous mode [ 1458.262480][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1458.324622][ T7] device bridge_slave_0 left promiscuous mode [ 1458.330778][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1458.385197][ T7] device bridge_slave_1 left promiscuous mode [ 1458.391372][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1458.440932][ T7] device bridge_slave_0 left promiscuous mode [ 1458.447924][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.497242][ T7] device hsr_slave_1 left promiscuous mode [ 1465.549006][ T7] device hsr_slave_0 left promiscuous mode [ 1465.599361][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1465.611890][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1465.624520][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1465.669283][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1465.763459][ T7] bond0 (unregistering): Released all slaves [ 1465.927547][ T7] device hsr_slave_1 left promiscuous mode [ 1465.967689][ T7] device hsr_slave_0 left promiscuous mode [ 1466.009911][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1466.021763][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1466.035157][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1466.089905][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1466.169396][ T7] bond0 (unregistering): Released all slaves [ 1466.297714][ T7] device hsr_slave_1 left promiscuous mode [ 1466.360645][ T7] device hsr_slave_0 left promiscuous mode [ 1466.400148][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1466.412023][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1466.425833][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1466.469060][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1466.563097][ T7] bond0 (unregistering): Released all slaves [ 1466.697641][ T7] device hsr_slave_1 left promiscuous mode [ 1466.739864][ T7] device hsr_slave_0 left promiscuous mode [ 1466.779615][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1466.791784][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1466.806376][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1466.839752][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1466.920772][ T7] bond0 (unregistering): Released all slaves [ 1467.042826][T27298] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1467.060441][T27296] team0: Port device team_slave_0 added [ 1467.068658][T27296] team0: Port device team_slave_1 added [ 1467.105717][T27298] team0: Port device team_slave_0 added [ 1467.119512][T27298] team0: Port device team_slave_1 added [ 1467.186218][T27296] device hsr_slave_0 entered promiscuous mode [ 1467.224300][T27296] device hsr_slave_1 entered promiscuous mode [ 1467.327220][T27298] device hsr_slave_0 entered promiscuous mode [ 1467.374218][T27298] device hsr_slave_1 entered promiscuous mode [ 1467.503015][T27298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1467.535016][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1467.542843][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1467.554374][T27296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1467.573538][T27298] 8021q: adding VLAN 0 to HW filter on device team0 [ 1467.587306][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1467.598063][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1467.606709][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1467.616085][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1467.625382][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1467.632911][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1467.644965][T27296] 8021q: adding VLAN 0 to HW filter on device team0 [ 1467.657182][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1467.669131][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1467.678341][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1467.688155][T14158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1467.695272][T14158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1467.723613][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1467.732629][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1467.741970][T22483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1467.749119][T22483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1467.757633][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1467.767299][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1467.777682][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1467.784809][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1467.792448][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1467.802350][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1467.811285][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1467.820510][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1467.837442][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1467.846199][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1467.854881][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1467.863531][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1467.872464][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1467.882082][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1467.890136][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1467.910975][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1467.920601][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1467.930109][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1467.941061][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1467.956061][T27298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1467.968092][T27298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1467.979612][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1467.988421][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1468.000377][T27296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1468.030184][T27298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1468.118810][T27296] 8021q: adding VLAN 0 to HW filter on device batadv0 15:53:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x22a, 0x0) 15:53:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) writev(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) recvfrom$inet(r1, 0x0, 0x5298f83365f71587, 0x42, 0x0, 0x800e00818) shutdown(r0, 0x0) 15:53:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, &(0x7f00000000c0)) 15:53:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x22b, 0x0) [ 1468.913945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1468.919974][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:53:30 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x22c, 0x0) 15:53:30 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x22d, 0x0) 15:53:30 executing program 5: accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg(r0, 0x0, 0x0) 15:53:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:31 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:53:31 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x22e, 0x0) [ 1470.291191][ T26] audit: type=1804 audit(1560354811.254:52): pid=27788 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir693319063/syzkaller.mJxVPW/238/memory.events" dev="sda1" ino=16566 res=1 [ 1470.662664][T27892] IPVS: ftp: loaded support on port[0] = 21 [ 1470.800988][T27892] chnl_net:caif_netlink_parms(): no params data found [ 1470.843711][T27892] bridge0: port 1(bridge_slave_0) entered blocking state [ 1470.851501][T27892] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.859483][T27892] device bridge_slave_0 entered promiscuous mode [ 1470.868096][T27892] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.875481][T27892] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.883615][T27892] device bridge_slave_1 entered promiscuous mode [ 1470.906665][T27892] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1470.917642][T27892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1470.940571][T27892] team0: Port device team_slave_0 added [ 1470.949859][T27892] team0: Port device team_slave_1 added [ 1471.005880][T27892] device hsr_slave_0 entered promiscuous mode [ 1471.054464][T27892] device hsr_slave_1 entered promiscuous mode [ 1471.126994][T27892] bridge0: port 2(bridge_slave_1) entered blocking state [ 1471.135009][T27892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1471.142403][T27892] bridge0: port 1(bridge_slave_0) entered blocking state [ 1471.149565][T27892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1471.186832][T14158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.199948][T14158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1471.269778][T27892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1471.285894][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1471.294896][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1471.306158][T27892] 8021q: adding VLAN 0 to HW filter on device team0 [ 1471.331815][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1471.341007][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1471.350830][T14405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1471.358081][T14405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1471.367409][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1471.376959][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1471.386056][T14405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1471.393538][T14405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1471.425360][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1471.436840][T27897] IPVS: ftp: loaded support on port[0] = 21 [ 1471.445434][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1471.461598][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1471.471803][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1471.481648][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1471.490847][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1471.500314][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1471.509356][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1471.538513][T27892] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1471.551660][T27892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1471.561702][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1471.570731][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1471.588892][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1471.648281][T27892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1471.788599][T27897] chnl_net:caif_netlink_parms(): no params data found [ 1471.888342][T27897] bridge0: port 1(bridge_slave_0) entered blocking state [ 1471.903044][T27897] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.931689][T27897] device bridge_slave_0 entered promiscuous mode [ 1471.949100][T27897] bridge0: port 2(bridge_slave_1) entered blocking state [ 1471.960993][T27897] bridge0: port 2(bridge_slave_1) entered disabled state [ 1471.979979][T27897] device bridge_slave_1 entered promiscuous mode [ 1472.022021][T27897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1472.051038][T27897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1472.077934][T27897] team0: Port device team_slave_0 added [ 1472.095496][T27897] team0: Port device team_slave_1 added [ 1472.187232][T27897] device hsr_slave_0 entered promiscuous mode [ 1472.224323][T27897] device hsr_slave_1 entered promiscuous mode [ 1472.492903][T27897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1472.516782][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1472.531416][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1472.544274][T27897] 8021q: adding VLAN 0 to HW filter on device team0 [ 1472.558009][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1472.567514][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1472.577375][T14520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.584516][T14520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1472.609054][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1472.617874][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1472.627529][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1472.637993][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.645464][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1472.654632][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1472.663437][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1472.680175][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1472.690151][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1472.699543][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1472.708474][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1472.717870][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1472.730170][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1472.739190][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1472.750944][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1472.761018][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1472.772353][T27897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1472.796879][T27897] 8021q: adding VLAN 0 to HW filter on device batadv0 15:53:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r0, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 15:53:33 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x22f, 0x0) 15:53:34 executing program 5: socket$inet6_sctp(0xa, 0x0, 0x84) unshare(0x6c060000) 15:53:34 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x230, 0x0) 15:53:34 executing program 5: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x10400003) 15:53:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x7fffc) pipe(&(0x7f00000001c0)) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:53:34 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x231, 0x0) [ 1474.033911][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1474.039759][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:53:35 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x232, 0x0) [ 1475.090181][T28347] IPVS: ftp: loaded support on port[0] = 21 15:53:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1475.876838][T28351] IPVS: ftp: loaded support on port[0] = 21 [ 1475.878274][T28350] IPVS: ftp: loaded support on port[0] = 21 [ 1476.648527][T28347] chnl_net:caif_netlink_parms(): no params data found [ 1477.072059][T28347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.079550][T28347] bridge0: port 1(bridge_slave_0) entered disabled state [ 1477.087472][T28347] device bridge_slave_0 entered promiscuous mode [ 1477.425853][T28347] bridge0: port 2(bridge_slave_1) entered blocking state [ 1477.432947][T28347] bridge0: port 2(bridge_slave_1) entered disabled state [ 1477.443071][T28347] device bridge_slave_1 entered promiscuous mode [ 1477.463109][T28351] chnl_net:caif_netlink_parms(): no params data found [ 1477.812408][T28350] chnl_net:caif_netlink_parms(): no params data found [ 1477.824632][T28347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1477.847945][T28347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1477.911977][T28351] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.919263][T28351] bridge0: port 1(bridge_slave_0) entered disabled state [ 1477.927571][T28351] device bridge_slave_0 entered promiscuous mode [ 1477.936745][T28347] team0: Port device team_slave_0 added [ 1477.942603][T28350] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.949949][T28350] bridge0: port 1(bridge_slave_0) entered disabled state [ 1477.958348][T28350] device bridge_slave_0 entered promiscuous mode [ 1477.967625][T28347] team0: Port device team_slave_1 added [ 1477.973427][T28351] bridge0: port 2(bridge_slave_1) entered blocking state [ 1477.980650][T28351] bridge0: port 2(bridge_slave_1) entered disabled state [ 1477.988794][T28351] device bridge_slave_1 entered promiscuous mode [ 1477.996669][T28350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.003729][T28350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.011959][T28350] device bridge_slave_1 entered promiscuous mode [ 1478.391025][T28351] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1478.402389][T28350] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1478.445705][T28347] device hsr_slave_0 entered promiscuous mode [ 1478.499314][T28347] device hsr_slave_1 entered promiscuous mode [ 1478.556153][T28351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1478.567641][T28350] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1478.581348][ T7] device bridge_slave_1 left promiscuous mode [ 1478.588641][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.624709][ T7] device bridge_slave_0 left promiscuous mode [ 1478.630864][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.685998][ T7] device bridge_slave_1 left promiscuous mode [ 1478.692187][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.755527][ T7] device bridge_slave_0 left promiscuous mode [ 1478.761682][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.835706][ T7] device bridge_slave_1 left promiscuous mode [ 1478.841871][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.915196][ T7] device bridge_slave_0 left promiscuous mode [ 1478.921372][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.965253][ T7] device bridge_slave_1 left promiscuous mode [ 1478.971406][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1479.015107][ T7] device bridge_slave_0 left promiscuous mode [ 1479.021325][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1479.066101][ T7] device bridge_slave_1 left promiscuous mode [ 1479.072321][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1479.115036][ T7] device bridge_slave_0 left promiscuous mode [ 1479.121184][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1488.236646][ T7] device hsr_slave_1 left promiscuous mode [ 1488.278324][ T7] device hsr_slave_0 left promiscuous mode [ 1488.337852][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1488.350942][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1488.362599][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1488.392093][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1488.480567][ T7] bond0 (unregistering): Released all slaves [ 1488.645979][ T7] device hsr_slave_1 left promiscuous mode [ 1488.699577][ T7] device hsr_slave_0 left promiscuous mode [ 1488.757026][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1488.770413][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1488.781656][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1488.820122][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1488.911737][ T7] bond0 (unregistering): Released all slaves [ 1489.037401][ T7] device hsr_slave_1 left promiscuous mode [ 1489.077758][ T7] device hsr_slave_0 left promiscuous mode [ 1489.117276][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1489.130446][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1489.141730][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1489.200883][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1489.320445][ T7] bond0 (unregistering): Released all slaves [ 1489.477166][ T7] device hsr_slave_1 left promiscuous mode [ 1489.529267][ T7] device hsr_slave_0 left promiscuous mode [ 1489.569878][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1489.581767][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1489.596447][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1489.640538][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1489.734158][ T7] bond0 (unregistering): Released all slaves [ 1489.897344][ T7] device hsr_slave_1 left promiscuous mode [ 1489.939452][ T7] device hsr_slave_0 left promiscuous mode [ 1489.977317][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1489.994331][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1490.005059][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1490.040799][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1490.132106][ T7] bond0 (unregistering): Released all slaves [ 1490.269615][T28351] team0: Port device team_slave_0 added [ 1490.285148][T28351] team0: Port device team_slave_1 added [ 1490.315767][T28350] team0: Port device team_slave_0 added [ 1490.356850][T28351] device hsr_slave_0 entered promiscuous mode [ 1490.394190][T28351] device hsr_slave_1 entered promiscuous mode [ 1490.445839][T28350] team0: Port device team_slave_1 added [ 1490.526122][T28350] device hsr_slave_0 entered promiscuous mode [ 1490.564164][T28350] device hsr_slave_1 entered promiscuous mode [ 1490.641718][T28347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1490.669878][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1490.678364][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1490.689305][T28347] 8021q: adding VLAN 0 to HW filter on device team0 [ 1490.714312][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1490.722928][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1490.733378][T14158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1490.740482][T14158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1490.765844][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1490.773666][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1490.782859][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1490.791561][T14158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1490.798668][T14158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1490.807108][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1490.825513][T28351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1490.854977][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1490.864276][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1490.872817][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1490.883024][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1490.892299][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1490.901077][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1490.910180][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1490.918700][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1490.927347][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1490.935679][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1490.949051][T28347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1490.972451][T28350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1490.998917][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.007706][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.015753][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.023349][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.034639][T28351] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.051067][T28347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1491.061583][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.070800][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.089853][ T8974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.097008][ T8974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.111311][T28350] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.122710][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1491.131349][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.140497][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.158389][T14520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.165569][T14520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.199126][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1491.210607][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1491.220734][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1491.244712][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1491.253397][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1491.262757][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1491.272045][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1491.282428][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1491.293289][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.302594][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.315133][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.322950][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.339700][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1491.390681][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1491.403421][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1491.421976][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.431305][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.440932][T14520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.448089][T14520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.459548][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1491.468750][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1491.478696][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1491.488265][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1491.501060][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1491.510664][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1491.522427][T28351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1491.544119][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1491.552939][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1491.561358][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1491.571965][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1491.581389][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1491.591417][T28350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1491.779248][T28350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1491.802436][T28351] 8021q: adding VLAN 0 to HW filter on device batadv0 15:53:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:53 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x233, 0x0) 15:53:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/127, 0x7f}], 0x1) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, 0x0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000100)={0x4, 0x8}, 0x10) 15:53:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:53:53 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x234, 0x0) 15:53:53 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='veth0_to_bond\x00', 0x323) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x2e9) 15:53:54 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x235, 0x0) 15:53:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:54 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x236, 0x0) 15:53:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:54 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x237, 0x0) 15:53:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1494.280226][T28916] IPVS: ftp: loaded support on port[0] = 21 [ 1494.421115][T28916] chnl_net:caif_netlink_parms(): no params data found [ 1494.473348][T28916] bridge0: port 1(bridge_slave_0) entered blocking state [ 1494.487306][T28916] bridge0: port 1(bridge_slave_0) entered disabled state [ 1494.498337][T28916] device bridge_slave_0 entered promiscuous mode [ 1494.511155][T28916] bridge0: port 2(bridge_slave_1) entered blocking state [ 1494.522890][T28916] bridge0: port 2(bridge_slave_1) entered disabled state [ 1494.537985][T28916] device bridge_slave_1 entered promiscuous mode [ 1494.572283][T28916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1494.590008][T28916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1494.619324][T28916] team0: Port device team_slave_0 added [ 1494.627515][T28916] team0: Port device team_slave_1 added [ 1494.676716][T28916] device hsr_slave_0 entered promiscuous mode [ 1494.724934][T28916] device hsr_slave_1 entered promiscuous mode [ 1494.811605][T28916] bridge0: port 2(bridge_slave_1) entered blocking state [ 1494.818779][T28916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1494.826243][T28916] bridge0: port 1(bridge_slave_0) entered blocking state [ 1494.833346][T28916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1494.889435][T28921] IPVS: ftp: loaded support on port[0] = 21 [ 1494.949134][T28916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1494.992883][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1495.002953][T25208] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.011679][T25208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.029831][T28916] 8021q: adding VLAN 0 to HW filter on device team0 [ 1495.083967][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1495.092451][T20875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1495.099574][T20875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1495.108735][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1495.117301][T20875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.124409][T20875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1495.178595][T28921] chnl_net:caif_netlink_parms(): no params data found [ 1495.189502][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1495.217265][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1495.226014][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1495.234922][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1495.243219][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1495.260953][T28916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1495.352456][T28916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1495.363042][T28921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1495.378825][T28921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.401892][T28921] device bridge_slave_0 entered promiscuous mode [ 1495.425589][T28921] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.432737][T28921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.462050][T28921] device bridge_slave_1 entered promiscuous mode [ 1495.491516][T28921] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1495.512649][T28921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1495.546863][T28921] team0: Port device team_slave_0 added [ 1495.558821][T28921] team0: Port device team_slave_1 added [ 1495.647248][T28921] device hsr_slave_0 entered promiscuous mode [ 1495.664487][T28921] device hsr_slave_1 entered promiscuous mode [ 1495.736781][T28921] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.743930][T28921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1495.751301][T28921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1495.758420][T28921] bridge0: port 1(bridge_slave_0) entered forwarding state 15:53:56 executing program 1: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1495.929978][T28921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1495.953595][ T9007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.992448][ T9007] bridge0: port 2(bridge_slave_1) entered disabled state [ 1496.005770][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1496.018798][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1496.026717][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1496.039644][T28921] 8021q: adding VLAN 0 to HW filter on device team0 [ 1496.053692][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1496.063001][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1496.070130][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1496.123152][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1496.141487][ T9007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1496.148638][ T9007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1496.189077][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1496.203182][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1496.242789][T28921] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1496.253744][T28921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1496.265908][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1496.273738][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1496.282742][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1496.292747][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1496.322041][T28921] 8021q: adding VLAN 0 to HW filter on device batadv0 15:53:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:53:57 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x238, 0x0) 15:53:57 executing program 1: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:57 executing program 1: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:58 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x239, 0x0) 15:53:58 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:53:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1498.944984][T29290] IPVS: ftp: loaded support on port[0] = 21 [ 1499.275161][T29292] IPVS: ftp: loaded support on port[0] = 21 [ 1499.598120][T29290] chnl_net:caif_netlink_parms(): no params data found [ 1499.920303][T29290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1499.931155][T29290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1499.938975][T29290] device bridge_slave_0 entered promiscuous mode [ 1500.211023][T29290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1500.218327][T29290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1500.226471][T29290] device bridge_slave_1 entered promiscuous mode [ 1500.252890][T29292] chnl_net:caif_netlink_parms(): no params data found [ 1500.268431][T29290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1500.543575][T29290] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1500.847540][T29290] team0: Port device team_slave_0 added [ 1500.853376][T29292] bridge0: port 1(bridge_slave_0) entered blocking state [ 1500.860937][T29292] bridge0: port 1(bridge_slave_0) entered disabled state [ 1500.869086][T29292] device bridge_slave_0 entered promiscuous mode [ 1500.879289][T29290] team0: Port device team_slave_1 added [ 1500.885497][T29292] bridge0: port 2(bridge_slave_1) entered blocking state [ 1500.892617][T29292] bridge0: port 2(bridge_slave_1) entered disabled state [ 1500.901328][T29292] device bridge_slave_1 entered promiscuous mode [ 1500.918559][ T7] device bridge_slave_1 left promiscuous mode [ 1500.925714][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1500.964922][ T7] device bridge_slave_0 left promiscuous mode [ 1500.971057][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.047497][ T7] device bridge_slave_1 left promiscuous mode [ 1501.053726][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.104984][ T7] device bridge_slave_0 left promiscuous mode [ 1501.111204][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.175955][ T7] device bridge_slave_1 left promiscuous mode [ 1501.182263][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.235052][ T7] device bridge_slave_0 left promiscuous mode [ 1501.241311][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.305927][ T7] device bridge_slave_1 left promiscuous mode [ 1501.312132][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.354945][ T7] device bridge_slave_0 left promiscuous mode [ 1501.361163][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1508.357963][ T7] device hsr_slave_1 left promiscuous mode [ 1508.407841][ T7] device hsr_slave_0 left promiscuous mode [ 1508.461848][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1508.472465][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1508.485640][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1508.542173][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1508.632789][ T7] bond0 (unregistering): Released all slaves [ 1508.807558][ T7] device hsr_slave_1 left promiscuous mode [ 1508.847304][ T7] device hsr_slave_0 left promiscuous mode [ 1508.899706][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1508.911270][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1508.924316][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1508.968506][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1509.062254][ T7] bond0 (unregistering): Released all slaves [ 1509.198749][ T7] device hsr_slave_1 left promiscuous mode [ 1509.267444][ T7] device hsr_slave_0 left promiscuous mode [ 1509.319910][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1509.331398][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1509.344481][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1509.380376][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1509.473646][ T7] bond0 (unregistering): Released all slaves [ 1509.646191][ T7] device hsr_slave_1 left promiscuous mode [ 1509.687314][ T7] device hsr_slave_0 left promiscuous mode [ 1509.747338][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1509.770316][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1509.781608][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1509.821386][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1509.923015][ T7] bond0 (unregistering): Released all slaves [ 1510.025246][T29292] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1510.042810][T29292] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1510.106760][T29290] device hsr_slave_0 entered promiscuous mode [ 1510.154429][T29290] device hsr_slave_1 entered promiscuous mode [ 1510.225435][T29292] team0: Port device team_slave_0 added [ 1510.232792][T29292] team0: Port device team_slave_1 added [ 1510.297160][T29292] device hsr_slave_0 entered promiscuous mode [ 1510.334280][T29292] device hsr_slave_1 entered promiscuous mode [ 1510.420762][T29290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1510.448233][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1510.460855][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1510.485131][T29290] 8021q: adding VLAN 0 to HW filter on device team0 [ 1510.504840][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1510.513384][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1510.522319][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.529509][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1510.537965][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1510.555537][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1510.568353][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1510.576793][ T3486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.583875][ T3486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.621559][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1510.630473][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1510.640232][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1510.648932][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1510.657681][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1510.666356][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1510.675075][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1510.683317][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1510.694977][T29292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1510.703286][T29290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1510.717475][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1510.726592][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1510.741432][T29292] 8021q: adding VLAN 0 to HW filter on device team0 [ 1510.756379][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1510.764747][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1510.779314][T29290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1510.788732][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1510.798775][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1510.808822][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.815945][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1510.826011][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1510.847204][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1510.856462][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1510.865598][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.872677][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.881388][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1510.891273][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1510.907131][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1510.916590][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1510.939007][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1511.039538][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 15:54:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:12 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:12 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2) 15:54:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1511.151645][T29292] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1511.235874][T29292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1511.294844][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1511.312500][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1511.803735][T29292] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:13 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x3) 15:54:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, &(0x7f0000000100)=@un=@abs, 0x8) recvfrom$inet(r0, 0x0, 0xcc5, 0x0, 0x0, 0x800e007c5) shutdown(r0, 0x0) 15:54:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4) 15:54:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x4a, &(0x7f0000000040)={@multicast1, @rand_addr=0xf8e, 0x1, 0x1, [@broadcast]}, 0x14) recvfrom$inet(r1, 0x0, 0x0, 0xc2, 0x0, 0x800e005a7) 15:54:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5) 15:54:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6) 15:54:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:14 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x7) 15:54:14 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 15:54:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1514.318780][T29795] IPVS: ftp: loaded support on port[0] = 21 [ 1514.448066][T29795] chnl_net:caif_netlink_parms(): no params data found [ 1514.490469][T29795] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.498875][T29795] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.507381][T29795] device bridge_slave_0 entered promiscuous mode [ 1514.516414][T29795] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.523538][T29795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.532925][T29795] device bridge_slave_1 entered promiscuous mode [ 1514.560280][T29795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1514.571228][T29795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1514.596264][T29795] team0: Port device team_slave_0 added [ 1514.603663][T29795] team0: Port device team_slave_1 added [ 1514.677016][T29795] device hsr_slave_0 entered promiscuous mode [ 1514.744430][T29795] device hsr_slave_1 entered promiscuous mode [ 1514.802712][T29795] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.809854][T29795] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1514.817277][T29795] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.824465][T29795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1514.882654][T29795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1514.897291][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1514.906164][T25208] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.915295][T25208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.923375][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1514.936177][T29795] 8021q: adding VLAN 0 to HW filter on device team0 [ 1514.947299][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1514.955686][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.962804][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1514.973078][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1514.981944][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.989063][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1515.008683][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1515.017291][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1515.035524][T29795] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1515.046787][T29795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1515.059074][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1515.067834][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1515.076390][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1515.085682][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1515.333000][T29795] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:16 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8) 15:54:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0xffec) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200003d9) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) accept$inet(r1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:54:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:16 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9) 15:54:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:17 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa) 15:54:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:17 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb) 15:54:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1518.493760][T29966] IPVS: ftp: loaded support on port[0] = 21 [ 1518.988581][T29966] chnl_net:caif_netlink_parms(): no params data found [ 1519.018394][T29966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1519.025639][T29966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1519.033214][T29966] device bridge_slave_0 entered promiscuous mode [ 1519.041005][T29966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1519.048662][T29966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1519.056470][T29966] device bridge_slave_1 entered promiscuous mode [ 1519.069983][ T7] device bridge_slave_1 left promiscuous mode [ 1519.078163][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1519.125335][ T7] device bridge_slave_0 left promiscuous mode [ 1519.131508][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1519.186139][ T7] device bridge_slave_1 left promiscuous mode [ 1519.192356][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1519.245508][ T7] device bridge_slave_0 left promiscuous mode [ 1519.251704][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1522.617001][ T7] device hsr_slave_1 left promiscuous mode [ 1522.687229][ T7] device hsr_slave_0 left promiscuous mode [ 1522.747236][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1522.761895][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1522.773166][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1522.811335][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1522.901631][ T7] bond0 (unregistering): Released all slaves [ 1523.027303][ T7] device hsr_slave_1 left promiscuous mode [ 1523.078214][ T7] device hsr_slave_0 left promiscuous mode [ 1523.137513][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1523.152363][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1523.165071][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1523.218046][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1523.311893][ T7] bond0 (unregistering): Released all slaves [ 1523.415033][T29966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1523.425102][T29966] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1523.443145][T29966] team0: Port device team_slave_0 added [ 1523.451021][T29966] team0: Port device team_slave_1 added [ 1523.527009][T29966] device hsr_slave_0 entered promiscuous mode [ 1523.594139][T29966] device hsr_slave_1 entered promiscuous mode [ 1523.690451][T29966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1523.701388][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1523.711823][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1523.720403][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1523.731196][T29966] 8021q: adding VLAN 0 to HW filter on device team0 [ 1523.746147][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1523.763953][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1523.772230][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1523.779336][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1523.787530][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1523.796265][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1523.804780][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1523.811921][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1523.819802][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1523.832008][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1523.846119][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1523.857683][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1523.867974][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1523.876446][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1523.885619][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1523.900320][T29966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1523.911366][T29966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1523.919928][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1523.943991][T29966] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:25 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc) 15:54:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:25 executing program 5: socket$nl_route(0x10, 0x3, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x4000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x10000000000, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000340)) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r6, 0x80e85411, &(0x7f0000000200)=""/143) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @multicast2}, 0xffffffffffffff90) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff}) listen(r4, 0x10001) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000400)) ioctl$SNDRV_TIMER_IOCTL_STOP(r6, 0x54a1) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r3, &(0x7f0000007740), 0x0, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000040)=0x1) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syncfs(r0) 15:54:25 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd) 15:54:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) getsockopt$inet_int(r0, 0x0, 0x5, 0x0, &(0x7f0000000040)) recvfrom$inet(r0, 0x0, 0x518db98b, 0x0, 0x0, 0x800e007a1) shutdown(r1, 0x0) 15:54:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:25 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe) 15:54:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 15:54:26 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xf) [ 1526.752058][T30347] IPVS: ftp: loaded support on port[0] = 21 [ 1526.838256][T30347] chnl_net:caif_netlink_parms(): no params data found [ 1526.896887][T30347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1526.909617][T30347] bridge0: port 1(bridge_slave_0) entered disabled state [ 1526.918350][T30347] device bridge_slave_0 entered promiscuous mode [ 1526.929197][T30347] bridge0: port 2(bridge_slave_1) entered blocking state [ 1526.936428][T30347] bridge0: port 2(bridge_slave_1) entered disabled state [ 1526.944461][T30347] device bridge_slave_1 entered promiscuous mode [ 1526.961549][T30347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1526.972532][T30347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1526.992044][T30347] team0: Port device team_slave_0 added [ 1526.999500][T30347] team0: Port device team_slave_1 added [ 1527.056220][T30347] device hsr_slave_0 entered promiscuous mode [ 1527.114322][T30347] device hsr_slave_1 entered promiscuous mode [ 1527.427196][T30347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1527.568150][T30347] 8021q: adding VLAN 0 to HW filter on device team0 [ 1527.575869][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1527.583985][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1527.594243][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1527.602909][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1527.611661][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1527.618757][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1527.627350][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1527.774604][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1527.783451][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1527.791954][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1527.799093][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1527.806763][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1527.815757][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1527.834069][T30347] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1527.844698][T30347] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1527.857037][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1527.866091][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1527.875093][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1527.883471][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1527.892292][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1527.901364][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1527.909600][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1527.917998][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1527.926621][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1527.934535][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1528.074544][T30347] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x10) 15:54:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x79, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x10000) 15:54:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x11) 15:54:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x12) 15:54:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000) 15:54:30 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x13) 15:54:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8904, &(0x7f0000000000)={'team0\x00', @random="01003a1e2410"}) 15:54:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1530.475895][ T7] device bridge_slave_1 left promiscuous mode [ 1530.482109][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1530.554972][ T7] device bridge_slave_0 left promiscuous mode [ 1530.561163][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1530.616274][ T7] device bridge_slave_1 left promiscuous mode [ 1530.622475][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1530.675342][ T7] device bridge_slave_0 left promiscuous mode [ 1530.681518][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1533.977233][ T7] device hsr_slave_1 left promiscuous mode [ 1534.038681][ T7] device hsr_slave_0 left promiscuous mode [ 1534.089760][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1534.101230][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1534.112609][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1534.170995][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1534.239025][ T7] bond0 (unregistering): Released all slaves [ 1534.407430][ T7] device hsr_slave_1 left promiscuous mode [ 1534.457937][ T7] device hsr_slave_0 left promiscuous mode [ 1534.569717][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1534.581312][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1534.592520][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1534.637769][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1534.739966][ T7] bond0 (unregistering): Released all slaves [ 1534.854535][T30614] IPVS: ftp: loaded support on port[0] = 21 [ 1534.932052][T30614] chnl_net:caif_netlink_parms(): no params data found [ 1534.962054][T30614] bridge0: port 1(bridge_slave_0) entered blocking state [ 1534.969364][T30614] bridge0: port 1(bridge_slave_0) entered disabled state [ 1534.977307][T30614] device bridge_slave_0 entered promiscuous mode [ 1534.985678][T30614] bridge0: port 2(bridge_slave_1) entered blocking state [ 1534.992759][T30614] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.000558][T30614] device bridge_slave_1 entered promiscuous mode [ 1535.021400][T30614] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1535.035007][T30614] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1535.055604][T30614] team0: Port device team_slave_0 added [ 1535.062235][T30614] team0: Port device team_slave_1 added [ 1535.137075][T30614] device hsr_slave_0 entered promiscuous mode [ 1535.194342][T30614] device hsr_slave_1 entered promiscuous mode [ 1535.250064][T30614] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.257142][T30614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1535.264520][T30614] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.271569][T30614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1535.399923][T30614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1535.414241][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1535.422401][T15240] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.430371][T15240] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.448507][T30614] 8021q: adding VLAN 0 to HW filter on device team0 [ 1535.466311][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1535.482549][T15240] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.489665][T15240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1535.521368][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1535.530479][T15083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.537602][T15083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1535.573594][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1535.582774][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1535.598498][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1535.619441][T30614] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1535.634471][T30614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1535.644299][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1535.660101][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1535.691450][T30614] 8021q: adding VLAN 0 to HW filter on device batadv0 15:54:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:36 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x14) 15:54:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:54:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000008c0)) remap_file_pages(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x0, 0x0, 0x1000) creat(&(0x7f00000002c0)='./bus\x00', 0x4) rmdir(&(0x7f0000000500)='./bus\x00') r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f00000000c0)=0x202, 0x8) 15:54:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:54:36 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x15) 15:54:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7,k\x1a+@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x2) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) connect$inet6(r3, &(0x7f0000000080), 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 15:55:12 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x24) 15:55:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, 0x0) 15:55:12 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x25) [ 1571.243890][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1571.249790][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:55:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:12 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x26) [ 1571.554601][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1571.560484][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:55:12 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x27) 15:55:12 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x28) 15:55:12 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x29) 15:55:13 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) [ 1573.298063][T31439] IPVS: ftp: loaded support on port[0] = 21 [ 1573.450184][T31439] chnl_net:caif_netlink_parms(): no params data found [ 1573.510579][T31439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1573.521552][T31439] bridge0: port 1(bridge_slave_0) entered disabled state [ 1573.532889][T31439] device bridge_slave_0 entered promiscuous mode [ 1573.547896][T31439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1573.558424][T31439] bridge0: port 2(bridge_slave_1) entered disabled state [ 1573.568064][T31439] device bridge_slave_1 entered promiscuous mode [ 1573.586070][T31439] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1573.596441][T31439] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1573.612532][T31439] team0: Port device team_slave_0 added [ 1573.619954][T31439] team0: Port device team_slave_1 added [ 1573.677032][T31439] device hsr_slave_0 entered promiscuous mode [ 1573.714630][T31439] device hsr_slave_1 entered promiscuous mode [ 1573.835054][T31439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1573.846068][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1573.854550][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1573.864564][T31439] 8021q: adding VLAN 0 to HW filter on device team0 [ 1573.873460][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1573.883730][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1573.892176][ T9007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1573.899245][ T9007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1573.908270][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1573.918263][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1573.928249][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1573.936850][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1573.943972][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1573.957193][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1573.976441][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1573.985903][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1573.995246][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1574.003511][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1574.012382][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1574.021733][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1574.034074][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1574.042370][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1574.050895][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1574.059390][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1574.415533][T31439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1574.441347][T31439] 8021q: adding VLAN 0 to HW filter on device batadv0 15:55:15 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:15 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2a) 15:55:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126]}) 15:55:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1574.863929][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1574.869880][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:55:15 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:15 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2b) 15:55:16 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2c) 15:55:16 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:16 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2d) 15:55:16 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:16 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2e) 15:55:16 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) [ 1576.843681][T31485] IPVS: ftp: loaded support on port[0] = 21 [ 1577.181482][T31489] IPVS: ftp: loaded support on port[0] = 21 [ 1577.181490][T31488] IPVS: ftp: loaded support on port[0] = 21 [ 1577.457000][T31485] chnl_net:caif_netlink_parms(): no params data found [ 1577.502346][ T7] device bridge_slave_1 left promiscuous mode [ 1577.509945][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.574639][ T7] device bridge_slave_0 left promiscuous mode [ 1577.580832][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.645225][ T7] device bridge_slave_1 left promiscuous mode [ 1577.651416][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.715109][ T7] device bridge_slave_0 left promiscuous mode [ 1577.721295][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.756079][ T7] device bridge_slave_1 left promiscuous mode [ 1577.762297][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.815167][ T7] device bridge_slave_0 left promiscuous mode [ 1577.821346][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1582.577124][ T7] device hsr_slave_1 left promiscuous mode [ 1582.619406][ T7] device hsr_slave_0 left promiscuous mode [ 1582.659512][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1582.670988][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1582.682159][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1582.747967][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1582.836870][ T7] bond0 (unregistering): Released all slaves [ 1582.987138][ T7] device hsr_slave_1 left promiscuous mode [ 1583.049880][ T7] device hsr_slave_0 left promiscuous mode [ 1583.109103][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1583.120610][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1583.132241][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1583.190954][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1583.291603][ T7] bond0 (unregistering): Released all slaves [ 1583.427764][ T7] device hsr_slave_1 left promiscuous mode [ 1583.509736][ T7] device hsr_slave_0 left promiscuous mode [ 1583.569590][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1583.581068][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1583.592187][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1583.630462][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1583.727604][ T7] bond0 (unregistering): Released all slaves [ 1583.855496][T31485] bridge0: port 1(bridge_slave_0) entered blocking state [ 1583.862590][T31485] bridge0: port 1(bridge_slave_0) entered disabled state [ 1583.871430][T31485] device bridge_slave_0 entered promiscuous mode [ 1583.890764][T31485] bridge0: port 2(bridge_slave_1) entered blocking state [ 1583.900417][T31485] bridge0: port 2(bridge_slave_1) entered disabled state [ 1583.908618][T31485] device bridge_slave_1 entered promiscuous mode [ 1583.984958][T31485] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1583.995292][T31485] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1584.020225][T31489] chnl_net:caif_netlink_parms(): no params data found [ 1584.036734][T31488] chnl_net:caif_netlink_parms(): no params data found [ 1584.059747][T31485] team0: Port device team_slave_0 added [ 1584.067179][T31485] team0: Port device team_slave_1 added [ 1584.122048][T31489] bridge0: port 1(bridge_slave_0) entered blocking state [ 1584.131114][T31489] bridge0: port 1(bridge_slave_0) entered disabled state [ 1584.138914][T31489] device bridge_slave_0 entered promiscuous mode [ 1584.215733][T31485] device hsr_slave_0 entered promiscuous mode [ 1584.284361][T31485] device hsr_slave_1 entered promiscuous mode [ 1584.360322][T31488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1584.367546][T31488] bridge0: port 1(bridge_slave_0) entered disabled state [ 1584.375759][T31488] device bridge_slave_0 entered promiscuous mode [ 1584.383001][T31489] bridge0: port 2(bridge_slave_1) entered blocking state [ 1584.390168][T31489] bridge0: port 2(bridge_slave_1) entered disabled state [ 1584.398466][T31489] device bridge_slave_1 entered promiscuous mode [ 1584.416053][T31488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1584.423184][T31488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1584.431292][T31488] device bridge_slave_1 entered promiscuous mode [ 1584.442845][T31489] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1584.453402][T31489] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1584.501526][T31489] team0: Port device team_slave_0 added [ 1584.510584][T31489] team0: Port device team_slave_1 added [ 1584.519882][T31488] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1584.530741][T31488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1584.563467][T31488] team0: Port device team_slave_0 added [ 1584.572495][T31488] team0: Port device team_slave_1 added [ 1584.715826][T31489] device hsr_slave_0 entered promiscuous mode [ 1584.764181][T31489] device hsr_slave_1 entered promiscuous mode [ 1584.866669][T31488] device hsr_slave_0 entered promiscuous mode [ 1584.904248][T31488] device hsr_slave_1 entered promiscuous mode [ 1584.952969][T31489] bridge0: port 2(bridge_slave_1) entered blocking state [ 1584.960101][T31489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1584.967513][T31489] bridge0: port 1(bridge_slave_0) entered blocking state [ 1584.974610][T31489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1584.989667][ T9007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1584.997784][ T9007] bridge0: port 2(bridge_slave_1) entered disabled state [ 1585.019510][T31485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1585.059847][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1585.068379][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1585.081158][T31485] 8021q: adding VLAN 0 to HW filter on device team0 [ 1585.093410][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1585.102764][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1585.111592][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.118698][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1585.136173][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1585.146946][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1585.156320][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1585.165698][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.172756][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1585.184018][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1585.211227][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1585.220640][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1585.229427][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1585.238431][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1585.247111][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1585.256066][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1585.289057][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1585.297447][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1585.307495][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1585.316073][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1585.336315][T31488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1585.351652][T31489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1585.366298][T31485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1585.510495][T31488] 8021q: adding VLAN 0 to HW filter on device team0 [ 1585.531480][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1585.539740][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1585.548128][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1585.556607][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1585.578302][T31489] 8021q: adding VLAN 0 to HW filter on device team0 [ 1585.597984][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1585.609180][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1585.622447][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.629567][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1585.644829][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1585.653522][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1585.668105][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.675223][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1585.689935][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1585.700730][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1585.752029][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1585.762531][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1585.779383][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1585.789736][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1585.806176][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1585.819990][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1585.830188][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1585.845153][T15240] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.852228][T15240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1585.867315][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1585.879547][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1585.891467][T15240] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.899418][T15240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1585.914651][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1585.923508][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1585.938705][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1585.950311][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1585.967266][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1585.979558][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1585.991802][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1586.003437][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1586.027976][T31485] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1586.047950][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1586.060536][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1586.087477][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1586.106454][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1586.128653][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1586.148088][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1586.160972][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1586.171936][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1586.188647][T31489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1586.199415][T31488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1586.257905][T31488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1586.274430][T31489] 8021q: adding VLAN 0 to HW filter on device batadv0 15:55:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126]}) 15:55:27 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x2f) 15:55:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:27 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:27 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x30) 15:55:27 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:28 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x31) 15:55:28 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:28 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x32) 15:55:28 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126]}) 15:55:28 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x33) [ 1588.684407][T31562] IPVS: ftp: loaded support on port[0] = 21 [ 1588.792317][T31562] chnl_net:caif_netlink_parms(): no params data found [ 1588.823640][T31562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1588.830874][T31562] bridge0: port 1(bridge_slave_0) entered disabled state [ 1588.839052][T31562] device bridge_slave_0 entered promiscuous mode [ 1588.846948][T31562] bridge0: port 2(bridge_slave_1) entered blocking state [ 1588.854154][T31562] bridge0: port 2(bridge_slave_1) entered disabled state [ 1588.861761][T31562] device bridge_slave_1 entered promiscuous mode [ 1588.881077][T31562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1588.892066][T31562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1588.910384][T31562] team0: Port device team_slave_0 added [ 1588.918104][T31562] team0: Port device team_slave_1 added [ 1588.986776][T31562] device hsr_slave_0 entered promiscuous mode [ 1589.024334][T31562] device hsr_slave_1 entered promiscuous mode [ 1589.651193][T31562] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1589.665901][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1589.677772][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1589.685430][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1589.882469][T31562] 8021q: adding VLAN 0 to HW filter on device team0 [ 1589.894591][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1589.904897][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1589.915487][ T9007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1589.922570][ T9007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1589.930732][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1590.115301][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1590.125531][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1590.133915][T15240] bridge0: port 2(bridge_slave_1) entered blocking state [ 1590.140960][T15240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1590.155363][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1590.164352][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1590.175553][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1590.185525][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1590.194027][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1590.386750][T31562] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1590.397617][T31562] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1590.409324][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1590.419052][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1590.427526][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1590.436281][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1590.444715][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1590.452919][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1590.644177][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1590.660360][T31562] 8021q: adding VLAN 0 to HW filter on device batadv0 15:55:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:32 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x34) 15:55:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x0]}) 15:55:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x35) 15:55:32 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x36) 15:55:32 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x37) 15:55:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:32 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x38) [ 1592.696379][ T7] device bridge_slave_1 left promiscuous mode [ 1592.702583][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.735538][ T7] device bridge_slave_0 left promiscuous mode [ 1592.741696][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.795903][ T7] device bridge_slave_1 left promiscuous mode [ 1592.802214][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.855505][ T7] device bridge_slave_0 left promiscuous mode [ 1592.861695][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.935904][ T7] device bridge_slave_1 left promiscuous mode [ 1592.942074][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.975490][ T7] device bridge_slave_0 left promiscuous mode [ 1592.981640][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1597.877082][ T7] device hsr_slave_1 left promiscuous mode [ 1597.917112][ T7] device hsr_slave_0 left promiscuous mode [ 1597.980195][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1597.991812][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1598.002997][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1598.041688][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1598.140869][ T7] bond0 (unregistering): Released all slaves [ 1598.297880][ T7] device hsr_slave_1 left promiscuous mode [ 1598.359691][ T7] device hsr_slave_0 left promiscuous mode [ 1598.427465][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1598.441694][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1598.453002][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1598.518122][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1598.611771][ T7] bond0 (unregistering): Released all slaves [ 1598.836009][ T7] device hsr_slave_1 left promiscuous mode [ 1598.909735][ T7] device hsr_slave_0 left promiscuous mode [ 1598.970401][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1598.981925][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1598.993172][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1599.051064][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1599.149946][ T7] bond0 (unregistering): Released all slaves [ 1599.266079][T31617] IPVS: ftp: loaded support on port[0] = 21 [ 1599.266660][T31619] IPVS: ftp: loaded support on port[0] = 21 [ 1599.432467][T31617] chnl_net:caif_netlink_parms(): no params data found [ 1599.460613][T31619] chnl_net:caif_netlink_parms(): no params data found [ 1599.498876][T31617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.506160][T31617] bridge0: port 1(bridge_slave_0) entered disabled state [ 1599.513926][T31617] device bridge_slave_0 entered promiscuous mode [ 1599.521665][T31617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.528894][T31617] bridge0: port 2(bridge_slave_1) entered disabled state [ 1599.537028][T31617] device bridge_slave_1 entered promiscuous mode [ 1599.566121][T31617] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1599.581975][T31617] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1599.590456][T31619] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.601250][T31619] bridge0: port 1(bridge_slave_0) entered disabled state [ 1599.609121][T31619] device bridge_slave_0 entered promiscuous mode [ 1599.617414][T31619] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.624548][T31619] bridge0: port 2(bridge_slave_1) entered disabled state [ 1599.632510][T31619] device bridge_slave_1 entered promiscuous mode [ 1599.667215][T31617] team0: Port device team_slave_0 added [ 1599.676223][T31619] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1599.685719][T31617] team0: Port device team_slave_1 added [ 1599.692784][T31619] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1599.717188][T31619] team0: Port device team_slave_0 added [ 1599.725152][T31619] team0: Port device team_slave_1 added [ 1599.805840][T31619] device hsr_slave_0 entered promiscuous mode [ 1599.844222][T31619] device hsr_slave_1 entered promiscuous mode [ 1599.927108][T31617] device hsr_slave_0 entered promiscuous mode [ 1599.974291][T31617] device hsr_slave_1 entered promiscuous mode [ 1600.036219][T31617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.043322][T31617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1600.050754][T31617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.057857][T31617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1600.069927][T31619] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.076998][T31619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1600.084390][T31619] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.091443][T31619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1600.277509][T15423] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.285825][T15423] bridge0: port 2(bridge_slave_1) entered disabled state [ 1600.304019][T15423] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.324637][T15423] bridge0: port 2(bridge_slave_1) entered disabled state [ 1600.353075][T31619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1600.389391][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1600.405298][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1600.416194][T31619] 8021q: adding VLAN 0 to HW filter on device team0 [ 1600.439108][T31617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1600.455661][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1600.471604][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1600.481350][ T9007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.488489][ T9007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1600.541557][T31617] 8021q: adding VLAN 0 to HW filter on device team0 [ 1600.549371][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1600.565556][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1600.583415][T14525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.590550][T14525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1600.605920][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1600.620158][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1600.630192][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1600.645560][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1600.659655][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1600.668847][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1600.700378][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1600.709081][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1600.718026][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1600.727284][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1600.736420][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1600.745541][T14525] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.752623][T14525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1600.764826][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1600.773323][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1600.782267][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1600.792069][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1600.800876][T14525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.807989][T14525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1600.816267][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1600.824806][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1600.843036][T31619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1600.853560][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1600.863429][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1600.872869][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1600.882630][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1600.912909][T31617] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1600.924033][T31617] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1600.936872][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1600.945630][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1600.955116][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1600.963649][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1600.972457][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1600.981558][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1600.990277][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1601.001343][T31619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1601.014661][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1601.031155][T31617] 8021q: adding VLAN 0 to HW filter on device batadv0 15:55:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:42 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x39) 15:55:42 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x0]}) 15:55:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:42 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x3a) 15:55:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:42 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:42 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x3b) 15:55:42 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:42 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x3c) 15:55:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:43 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:43 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x3d) 15:55:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x0]}) 15:55:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:43 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x3e) [ 1603.555662][T31694] IPVS: ftp: loaded support on port[0] = 21 [ 1603.631552][T31694] chnl_net:caif_netlink_parms(): no params data found [ 1604.140549][T31694] bridge0: port 1(bridge_slave_0) entered blocking state [ 1604.148077][T31694] bridge0: port 1(bridge_slave_0) entered disabled state [ 1604.156248][T31694] device bridge_slave_0 entered promiscuous mode [ 1604.165340][T31694] bridge0: port 2(bridge_slave_1) entered blocking state [ 1604.172446][T31694] bridge0: port 2(bridge_slave_1) entered disabled state [ 1604.180278][T31694] device bridge_slave_1 entered promiscuous mode [ 1604.203243][T31694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1604.214748][T31694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1604.467836][T31694] team0: Port device team_slave_0 added [ 1604.475893][T31694] team0: Port device team_slave_1 added [ 1604.535857][T31694] device hsr_slave_0 entered promiscuous mode [ 1604.574333][T31694] device hsr_slave_1 entered promiscuous mode [ 1604.885027][T31694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1605.133201][T31694] 8021q: adding VLAN 0 to HW filter on device team0 [ 1605.141361][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1605.151770][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1605.160236][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1605.174651][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1605.183230][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1605.193098][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1605.200213][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1605.208159][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1605.216901][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1605.225188][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1605.232218][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1605.240109][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1605.249099][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1605.500049][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1605.508653][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1605.517273][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1605.526629][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1605.543567][T31694] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1605.555023][T31694] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1605.570779][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1605.579351][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1605.588108][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1605.596623][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1605.604907][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1605.613042][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1605.621457][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1605.883635][T31694] 8021q: adding VLAN 0 to HW filter on device batadv0 15:55:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:55:47 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:47 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x41) 15:55:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x2]}) 15:55:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:55:47 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x42) 15:55:47 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:47 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x43) 15:55:47 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:47 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x44) 15:55:47 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:55:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1607.836618][ T7] device bridge_slave_1 left promiscuous mode [ 1607.842859][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1607.884529][ T7] device bridge_slave_0 left promiscuous mode [ 1607.890674][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1607.955865][ T7] device bridge_slave_1 left promiscuous mode [ 1607.962006][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.024847][ T7] device bridge_slave_0 left promiscuous mode [ 1608.030997][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1608.065102][ T7] device bridge_slave_1 left promiscuous mode [ 1608.071238][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.115029][ T7] device bridge_slave_0 left promiscuous mode [ 1608.121181][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1608.165588][ T7] device bridge_slave_1 left promiscuous mode [ 1608.171751][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.216081][ T7] device bridge_slave_0 left promiscuous mode [ 1608.229305][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1614.666842][ T7] device hsr_slave_1 left promiscuous mode [ 1614.718316][ T7] device hsr_slave_0 left promiscuous mode [ 1614.777985][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1614.790625][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1614.802370][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1614.849002][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1614.921330][ T7] bond0 (unregistering): Released all slaves [ 1615.105922][ T7] device hsr_slave_1 left promiscuous mode [ 1615.159535][ T7] device hsr_slave_0 left promiscuous mode [ 1615.227491][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1615.238584][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1615.251213][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1615.310636][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1615.401360][ T7] bond0 (unregistering): Released all slaves [ 1615.576102][ T7] device hsr_slave_1 left promiscuous mode [ 1615.631000][ T7] device hsr_slave_0 left promiscuous mode [ 1615.709290][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1615.721161][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1615.733362][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1615.798472][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1615.890003][ T7] bond0 (unregistering): Released all slaves [ 1616.086748][ T7] device hsr_slave_1 left promiscuous mode [ 1616.140956][ T7] device hsr_slave_0 left promiscuous mode [ 1616.207337][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1616.220588][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1616.231827][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1616.271600][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1616.362240][ T7] bond0 (unregistering): Released all slaves [ 1616.488177][T31734] IPVS: ftp: loaded support on port[0] = 21 [ 1616.491169][T31738] IPVS: ftp: loaded support on port[0] = 21 [ 1616.506352][T31737] IPVS: ftp: loaded support on port[0] = 21 [ 1616.722515][T31738] chnl_net:caif_netlink_parms(): no params data found [ 1616.732237][T31737] chnl_net:caif_netlink_parms(): no params data found [ 1616.790930][T31734] chnl_net:caif_netlink_parms(): no params data found [ 1616.847733][T31738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1616.855422][T31738] bridge0: port 1(bridge_slave_0) entered disabled state [ 1616.863041][T31738] device bridge_slave_0 entered promiscuous mode [ 1616.877345][T31737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1616.886630][T31737] bridge0: port 1(bridge_slave_0) entered disabled state [ 1616.894622][T31737] device bridge_slave_0 entered promiscuous mode [ 1616.901954][T31738] bridge0: port 2(bridge_slave_1) entered blocking state [ 1616.909634][T31738] bridge0: port 2(bridge_slave_1) entered disabled state [ 1616.917788][T31738] device bridge_slave_1 entered promiscuous mode [ 1616.931098][T31737] bridge0: port 2(bridge_slave_1) entered blocking state [ 1616.938270][T31737] bridge0: port 2(bridge_slave_1) entered disabled state [ 1616.946378][T31737] device bridge_slave_1 entered promiscuous mode [ 1616.959073][T31734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1616.967928][T31734] bridge0: port 1(bridge_slave_0) entered disabled state [ 1616.975749][T31734] device bridge_slave_0 entered promiscuous mode [ 1616.988833][T31734] bridge0: port 2(bridge_slave_1) entered blocking state [ 1616.996077][T31734] bridge0: port 2(bridge_slave_1) entered disabled state [ 1617.004110][T31734] device bridge_slave_1 entered promiscuous mode [ 1617.025797][T31738] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1617.041652][T31738] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1617.060842][T31737] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1617.085012][T31734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1617.095054][T31737] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1617.104878][T31738] team0: Port device team_slave_0 added [ 1617.118136][T31734] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1617.127718][T31738] team0: Port device team_slave_1 added [ 1617.156510][T31734] team0: Port device team_slave_0 added [ 1617.166630][T31737] team0: Port device team_slave_0 added [ 1617.173541][T31737] team0: Port device team_slave_1 added [ 1617.195828][T31734] team0: Port device team_slave_1 added [ 1617.257078][T31738] device hsr_slave_0 entered promiscuous mode [ 1617.304437][T31738] device hsr_slave_1 entered promiscuous mode [ 1617.387233][T31737] device hsr_slave_0 entered promiscuous mode [ 1617.424246][T31737] device hsr_slave_1 entered promiscuous mode [ 1617.485054][T31738] bridge0: port 2(bridge_slave_1) entered blocking state [ 1617.492197][T31738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1617.499629][T31738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1617.506728][T31738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1617.558463][T31734] device hsr_slave_0 entered promiscuous mode [ 1617.624092][T31734] device hsr_slave_1 entered promiscuous mode [ 1617.705780][T24165] bridge0: port 1(bridge_slave_0) entered disabled state [ 1617.713673][T24165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1617.811499][T31738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1617.837307][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1617.845363][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1617.861542][T31734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1617.911473][T31737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1617.920552][T31738] 8021q: adding VLAN 0 to HW filter on device team0 [ 1618.040500][T31737] 8021q: adding VLAN 0 to HW filter on device team0 [ 1618.047953][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1618.056214][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1618.064697][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1618.072241][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1618.083038][T31734] 8021q: adding VLAN 0 to HW filter on device team0 [ 1618.156386][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1618.165500][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1618.174436][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1618.181489][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1618.189965][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1618.199374][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1618.208333][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1618.215457][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1618.223294][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1618.232844][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1618.241752][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1618.250959][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1618.259811][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1618.266924][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1618.275600][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1618.284740][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1618.293141][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1618.300253][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1618.342332][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1618.352142][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1618.367651][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1618.377678][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1618.384804][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1618.392870][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1618.402210][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1618.411375][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1618.420197][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1618.429733][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1618.439010][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1618.447846][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1618.457066][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1618.474947][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1618.483605][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1618.492509][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1618.501622][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1618.510381][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1618.517535][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1618.529950][T31737] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1618.542602][T31737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1618.561502][T31738] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1618.572665][T31738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1618.585159][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1618.593144][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1618.602493][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1618.610802][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1618.620129][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1618.628939][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1618.638195][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1618.647053][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1618.655945][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1618.664888][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1618.673244][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1618.706661][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1618.715232][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1618.724998][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1618.733677][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1618.743183][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1618.769570][T31738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1618.780793][T31737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1618.789106][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1618.799817][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1618.826835][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1618.853479][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1618.868750][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1618.879834][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1618.893718][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1618.911206][T31734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1619.017879][T31734] 8021q: adding VLAN 0 to HW filter on device batadv0 15:56:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x45) 15:56:00 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) [ 1619.244746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.251404][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:56:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x2]}) 15:56:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:00 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x46) 15:56:00 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x47) 15:56:00 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x48) 15:56:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x49) 15:56:01 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x2]}) 15:56:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, 0x0) 15:56:01 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) [ 1621.357466][T31810] IPVS: ftp: loaded support on port[0] = 21 [ 1621.466886][T31810] chnl_net:caif_netlink_parms(): no params data found [ 1621.507230][T31810] bridge0: port 1(bridge_slave_0) entered blocking state [ 1621.515713][T31810] bridge0: port 1(bridge_slave_0) entered disabled state [ 1621.523740][T31810] device bridge_slave_0 entered promiscuous mode [ 1621.532414][T31810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1621.539740][T31810] bridge0: port 2(bridge_slave_1) entered disabled state [ 1621.548217][T31810] device bridge_slave_1 entered promiscuous mode [ 1621.572848][T31810] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1621.584705][T31810] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1621.609914][T31810] team0: Port device team_slave_0 added [ 1621.618062][T31810] team0: Port device team_slave_1 added [ 1621.677097][T31810] device hsr_slave_0 entered promiscuous mode [ 1621.715666][T31810] device hsr_slave_1 entered promiscuous mode [ 1621.781471][T31810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1621.788566][T31810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1621.795960][T31810] bridge0: port 1(bridge_slave_0) entered blocking state [ 1621.803006][T31810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1621.889473][T31810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1621.909251][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1621.917245][T14520] bridge0: port 1(bridge_slave_0) entered disabled state [ 1621.928559][T14520] bridge0: port 2(bridge_slave_1) entered disabled state [ 1621.940373][T31810] 8021q: adding VLAN 0 to HW filter on device team0 [ 1621.952240][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1621.962024][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1621.969131][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1621.979838][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1621.990321][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1621.997450][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1622.013577][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1622.023090][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1622.034849][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1622.049425][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1622.061789][T31810] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1622.073399][T31810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1622.081495][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1622.101798][T31810] 8021q: adding VLAN 0 to HW filter on device batadv0 15:56:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x0, 0x2]}) 15:56:03 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4a) 15:56:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, 0x0) 15:56:03 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:03 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:03 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4b) 15:56:03 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:03 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4c) 15:56:03 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:03 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4d) [ 1624.343267][T31849] IPVS: ftp: loaded support on port[0] = 21 [ 1624.736467][T31852] IPVS: ftp: loaded support on port[0] = 21 [ 1624.775576][T31853] IPVS: ftp: loaded support on port[0] = 21 [ 1625.310416][T31849] chnl_net:caif_netlink_parms(): no params data found [ 1625.358960][T31849] bridge0: port 1(bridge_slave_0) entered blocking state [ 1625.369250][T31849] bridge0: port 1(bridge_slave_0) entered disabled state [ 1625.377050][T31849] device bridge_slave_0 entered promiscuous mode [ 1625.643059][T31849] bridge0: port 2(bridge_slave_1) entered blocking state [ 1625.650413][T31849] bridge0: port 2(bridge_slave_1) entered disabled state [ 1625.658396][T31849] device bridge_slave_1 entered promiscuous mode [ 1625.956747][T31849] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1625.970237][T31849] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1626.246699][T31849] team0: Port device team_slave_0 added [ 1626.280353][T31849] team0: Port device team_slave_1 added [ 1626.417099][T31849] device hsr_slave_0 entered promiscuous mode [ 1626.464357][T31849] device hsr_slave_1 entered promiscuous mode [ 1626.537007][T31853] chnl_net:caif_netlink_parms(): no params data found [ 1626.546051][T31852] chnl_net:caif_netlink_parms(): no params data found [ 1626.557417][ T7] device bridge_slave_1 left promiscuous mode [ 1626.563627][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.614965][ T7] device bridge_slave_0 left promiscuous mode [ 1626.621154][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1626.676009][ T7] device bridge_slave_1 left promiscuous mode [ 1626.682195][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.724759][ T7] device bridge_slave_0 left promiscuous mode [ 1626.730941][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1626.785204][ T7] device bridge_slave_1 left promiscuous mode [ 1626.791382][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.844580][ T7] device bridge_slave_0 left promiscuous mode [ 1626.850763][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1626.905218][ T7] device bridge_slave_1 left promiscuous mode [ 1626.911392][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.974717][ T7] device bridge_slave_0 left promiscuous mode [ 1626.980906][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1633.577166][ T7] device hsr_slave_1 left promiscuous mode [ 1633.619713][ T7] device hsr_slave_0 left promiscuous mode [ 1633.667393][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1633.680612][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1633.691813][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1633.728619][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1633.822314][ T7] bond0 (unregistering): Released all slaves [ 1634.006085][ T7] device hsr_slave_1 left promiscuous mode [ 1634.079949][ T7] device hsr_slave_0 left promiscuous mode [ 1634.147295][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1634.160598][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1634.171904][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1634.198524][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1634.319681][ T7] bond0 (unregistering): Released all slaves [ 1634.467260][ T7] device hsr_slave_1 left promiscuous mode [ 1634.509632][ T7] device hsr_slave_0 left promiscuous mode [ 1634.569137][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1634.580670][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1634.591946][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1634.628384][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1634.698377][ T7] bond0 (unregistering): Released all slaves [ 1634.836028][ T7] device hsr_slave_1 left promiscuous mode [ 1634.889759][ T7] device hsr_slave_0 left promiscuous mode [ 1634.950978][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1634.962467][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1634.975079][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1635.028429][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1635.120618][ T7] bond0 (unregistering): Released all slaves [ 1635.301649][T31853] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.310105][T31853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1635.319041][T31853] device bridge_slave_0 entered promiscuous mode [ 1635.330915][T31853] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.338626][T31853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1635.347075][T31853] device bridge_slave_1 entered promiscuous mode [ 1635.354347][T31852] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.361411][T31852] bridge0: port 1(bridge_slave_0) entered disabled state [ 1635.369934][T31852] device bridge_slave_0 entered promiscuous mode [ 1635.401357][T31853] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1635.427785][T31852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.435239][T31852] bridge0: port 2(bridge_slave_1) entered disabled state [ 1635.442879][T31852] device bridge_slave_1 entered promiscuous mode [ 1635.452928][T31853] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1635.490190][T31852] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1635.513918][T31853] team0: Port device team_slave_0 added [ 1635.521859][T31852] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1635.548956][T31849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1635.557205][T31853] team0: Port device team_slave_1 added [ 1635.564840][T31852] team0: Port device team_slave_0 added [ 1635.579426][T31849] 8021q: adding VLAN 0 to HW filter on device team0 [ 1635.589552][T31852] team0: Port device team_slave_1 added [ 1635.601654][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1635.609663][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1635.637487][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1635.646879][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1635.655678][T22483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.662722][T22483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1635.670614][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1635.679122][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1635.687612][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.694722][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1635.702575][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1635.757120][T31853] device hsr_slave_0 entered promiscuous mode [ 1635.804109][T31853] device hsr_slave_1 entered promiscuous mode [ 1635.854780][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1635.863291][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1635.871942][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1635.882555][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1635.891437][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1635.900234][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1635.922300][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1635.932598][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1635.941251][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1635.958828][T31849] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1635.973099][T31849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1636.015743][T31852] device hsr_slave_0 entered promiscuous mode [ 1636.054125][T31852] device hsr_slave_1 entered promiscuous mode [ 1636.114439][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1636.122953][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1636.163412][T31849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1636.242273][T31852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1636.251838][T31853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1636.262621][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1636.270755][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1636.299304][T31853] 8021q: adding VLAN 0 to HW filter on device team0 [ 1636.331233][T31852] 8021q: adding VLAN 0 to HW filter on device team0 [ 1636.340428][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1636.374386][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1636.382243][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1636.391518][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1636.470573][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1636.480579][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1636.489525][T15240] bridge0: port 1(bridge_slave_0) entered blocking state [ 1636.496689][T15240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1636.508592][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1636.517473][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1636.526060][T15240] bridge0: port 1(bridge_slave_0) entered blocking state [ 1636.526097][T15240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1636.526516][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1636.527201][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1636.527587][T15240] bridge0: port 2(bridge_slave_1) entered blocking state 15:56:17 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4e) 15:56:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x0, 0x2]}) [ 1636.527620][T15240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1636.528148][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1636.542868][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1636.565268][T15240] bridge0: port 2(bridge_slave_1) entered blocking state [ 1636.596634][T15240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1636.610343][T15240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1636.717956][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1636.725940][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1636.733848][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1636.742927][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1636.751517][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1636.766407][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1636.775608][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1636.784351][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1636.792898][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1636.802074][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1636.810050][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1637.028160][T31853] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1637.042709][T31853] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1637.064813][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1637.073532][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1637.082543][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1637.096889][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1637.105551][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1637.115754][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1637.124363][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1637.132745][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1637.141779][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1637.150648][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1637.159746][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1637.181990][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1637.194847][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1637.205232][T31852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1637.247600][T31853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1637.264822][T31852] 8021q: adding VLAN 0 to HW filter on device batadv0 15:56:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:18 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 15:56:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, 0x0) 15:56:18 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x4f) 15:56:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x0, 0x2]}) 15:56:18 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x50) 15:56:19 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, 0x0, 0x0, 0x0) 15:56:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x51) 15:56:19 executing program 2: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x52) 15:56:19 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, 0x0, 0x0, 0x0) [ 1638.433925][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1638.439808][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:56:19 executing program 2: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x53) [ 1640.010799][T32137] IPVS: ftp: loaded support on port[0] = 21 [ 1640.148722][T32137] chnl_net:caif_netlink_parms(): no params data found [ 1640.191185][T32137] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.200258][T32137] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.208622][T32137] device bridge_slave_0 entered promiscuous mode [ 1640.217470][T32137] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.225147][T32137] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.233167][T32137] device bridge_slave_1 entered promiscuous mode [ 1640.258301][T32137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1640.270347][T32137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1640.295471][T32137] team0: Port device team_slave_0 added [ 1640.302961][T32137] team0: Port device team_slave_1 added [ 1640.387094][T32137] device hsr_slave_0 entered promiscuous mode [ 1640.424311][T32137] device hsr_slave_1 entered promiscuous mode [ 1640.482119][T32140] IPVS: ftp: loaded support on port[0] = 21 [ 1640.489984][T32137] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.497096][T32137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1640.504571][T32137] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.511645][T32137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1640.649372][T32140] chnl_net:caif_netlink_parms(): no params data found [ 1640.667517][T32137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1640.702730][T32140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.709949][T32140] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.718037][T32140] device bridge_slave_0 entered promiscuous mode [ 1640.727260][T32140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.737787][T32140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.745657][T32140] device bridge_slave_1 entered promiscuous mode [ 1640.752800][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1640.761424][T22483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.769588][T22483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.778376][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1641.167244][T32137] 8021q: adding VLAN 0 to HW filter on device team0 [ 1641.186744][T32140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1641.197925][T32140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1641.222045][T32140] team0: Port device team_slave_0 added [ 1641.232540][T32140] team0: Port device team_slave_1 added [ 1641.430194][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1641.440027][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1641.448499][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1641.455680][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1641.466381][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1641.475434][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1641.484006][ T3486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1641.491080][ T3486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1641.527052][T32140] device hsr_slave_0 entered promiscuous mode [ 1641.594327][T32140] device hsr_slave_1 entered promiscuous mode [ 1641.838496][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1641.848979][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1642.056096][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1642.067777][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1642.093458][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1642.101727][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1642.110580][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1642.119452][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1642.128097][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1642.136795][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1642.145298][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1642.158129][T32137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1642.387919][T32137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1642.402867][T32140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1642.618516][T32140] 8021q: adding VLAN 0 to HW filter on device team0 [ 1642.628139][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1642.636174][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1642.844361][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1642.853236][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1642.861935][T20875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1642.869047][T20875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1642.877377][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1643.232170][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1643.242409][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1643.250910][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1643.258003][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1643.267054][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1643.275960][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1643.287594][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1643.297454][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1643.496715][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1643.504889][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1643.513646][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1643.690511][ T7] device bridge_slave_1 left promiscuous mode [ 1643.698151][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1643.754597][ T7] device bridge_slave_0 left promiscuous mode [ 1643.760758][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1643.815239][ T7] device bridge_slave_1 left promiscuous mode [ 1643.821417][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1643.865760][ T7] device bridge_slave_0 left promiscuous mode [ 1643.871976][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1643.925915][ T7] device bridge_slave_1 left promiscuous mode [ 1643.932085][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1643.994845][ T7] device bridge_slave_0 left promiscuous mode [ 1644.001002][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1648.955870][ T7] device hsr_slave_1 left promiscuous mode [ 1649.019378][ T7] device hsr_slave_0 left promiscuous mode [ 1649.079067][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1649.090616][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1649.102005][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1649.160724][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1649.239840][ T7] bond0 (unregistering): Released all slaves [ 1649.447468][ T7] device hsr_slave_1 left promiscuous mode [ 1649.531087][ T7] device hsr_slave_0 left promiscuous mode [ 1649.589243][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1649.601026][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1649.612566][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1649.678277][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1649.762646][ T7] bond0 (unregistering): Released all slaves [ 1649.937472][ T7] device hsr_slave_1 left promiscuous mode [ 1650.000111][ T7] device hsr_slave_0 left promiscuous mode [ 1650.059007][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1650.070607][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1650.083282][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1650.121270][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1650.211811][ T7] bond0 (unregistering): Released all slaves [ 1650.307231][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1650.315902][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1650.342870][T32140] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1650.365980][T32140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1650.385390][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1650.398504][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1650.418191][T32140] 8021q: adding VLAN 0 to HW filter on device batadv0 15:56:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:31 executing program 2: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:31 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x54) 15:56:31 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, 0x0, 0x0, 0x0) 15:56:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126]}) 15:56:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x126, 0x2]}) 15:56:31 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 15:56:31 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x55) 15:56:31 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1650.913902][ C1] protocol 88fb is buggy, dev hsr_slave_0 15:56:31 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 15:56:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x56) 15:56:32 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 15:56:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:32 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x57) 15:56:32 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x58) [ 1652.722439][T32308] IPVS: ftp: loaded support on port[0] = 21 [ 1652.849010][T32308] chnl_net:caif_netlink_parms(): no params data found [ 1652.912315][T32308] bridge0: port 1(bridge_slave_0) entered blocking state [ 1652.930932][T32308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1652.942905][T32308] device bridge_slave_0 entered promiscuous mode [ 1652.961300][T32308] bridge0: port 2(bridge_slave_1) entered blocking state [ 1652.970756][T32308] bridge0: port 2(bridge_slave_1) entered disabled state [ 1652.986179][T32308] device bridge_slave_1 entered promiscuous mode [ 1653.021147][T32308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1653.039853][T32308] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1653.070567][T32308] team0: Port device team_slave_0 added [ 1653.083135][T32308] team0: Port device team_slave_1 added [ 1653.177288][T32308] device hsr_slave_0 entered promiscuous mode [ 1653.224623][T32308] device hsr_slave_1 entered promiscuous mode [ 1653.307950][T32308] bridge0: port 2(bridge_slave_1) entered blocking state [ 1653.315097][T32308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1653.322472][T32308] bridge0: port 1(bridge_slave_0) entered blocking state [ 1653.329605][T32308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1653.365150][T32311] IPVS: ftp: loaded support on port[0] = 21 [ 1653.446923][T32308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1653.462270][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1653.471030][T25208] bridge0: port 1(bridge_slave_0) entered disabled state [ 1653.479027][T25208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1653.488259][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1653.511707][T32308] 8021q: adding VLAN 0 to HW filter on device team0 [ 1653.526390][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1653.535644][T20875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1653.542708][T20875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1653.588110][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1653.596669][T20875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1653.603718][T20875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1653.620633][T32311] chnl_net:caif_netlink_parms(): no params data found [ 1653.906546][T32311] bridge0: port 1(bridge_slave_0) entered blocking state [ 1653.913650][T32311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1653.921486][T32311] device bridge_slave_0 entered promiscuous mode [ 1653.932094][T32311] bridge0: port 2(bridge_slave_1) entered blocking state [ 1653.939615][T32311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1653.947399][T32311] device bridge_slave_1 entered promiscuous mode [ 1653.956574][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1653.965767][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1653.974408][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1654.114612][T25211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1654.123357][T25211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1654.131841][T25211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1654.140389][T25211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1654.151666][T32311] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1654.164677][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1654.173093][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1654.303278][T32311] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1654.313397][T32308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1654.341808][T32311] team0: Port device team_slave_0 added [ 1654.349459][T32311] team0: Port device team_slave_1 added [ 1654.498321][T32308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1654.536874][T32311] device hsr_slave_0 entered promiscuous mode [ 1654.594441][T32311] device hsr_slave_1 entered promiscuous mode 15:56:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126]}) [ 1655.056432][T32311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1655.065798][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1655.208698][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1655.219493][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1655.392828][T32311] 8021q: adding VLAN 0 to HW filter on device team0 [ 1655.533416][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1655.542628][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1655.551415][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.558539][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1655.568631][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1655.578187][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1655.586993][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1655.594109][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1655.602108][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1655.611818][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1655.750325][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1655.759285][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1655.768474][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1655.779390][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1655.794530][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1655.803189][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1655.811638][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1655.820023][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1655.828941][ T7] device bridge_slave_1 left promiscuous mode [ 1655.835818][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1655.895083][ T7] device bridge_slave_0 left promiscuous mode [ 1655.901282][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1655.965256][ T7] device bridge_slave_1 left promiscuous mode [ 1655.971425][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1656.064633][ T7] device bridge_slave_0 left promiscuous mode [ 1656.070809][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.287094][ T7] device hsr_slave_1 left promiscuous mode [ 1659.349559][ T7] device hsr_slave_0 left promiscuous mode [ 1659.389694][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1659.402674][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1659.415033][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1659.458470][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1659.548640][ T7] bond0 (unregistering): Released all slaves [ 1659.697819][ T7] device hsr_slave_1 left promiscuous mode [ 1659.767383][ T7] device hsr_slave_0 left promiscuous mode [ 1659.819066][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1659.830593][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1659.841842][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1659.881556][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1659.981577][ T7] bond0 (unregistering): Released all slaves [ 1660.094071][T32311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1660.105155][T32311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1660.123275][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1660.132331][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1660.152961][T32311] 8021q: adding VLAN 0 to HW filter on device batadv0 15:56:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x126, 0x2]}) 15:56:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126]}) 15:56:41 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:41 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:56:41 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x59) 15:56:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:41 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:56:41 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5a) 15:56:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:41 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:56:41 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5b) 15:56:41 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc, 0x80, 0x0}}], 0x1, 0x0) 15:56:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x126, 0x2]}) 15:56:42 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5c) 15:56:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:42 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc, 0x80, 0x0}}], 0x1, 0x0) [ 1662.450005][T32478] IPVS: ftp: loaded support on port[0] = 21 [ 1662.588941][T32478] chnl_net:caif_netlink_parms(): no params data found [ 1662.649275][T32478] bridge0: port 1(bridge_slave_0) entered blocking state [ 1662.662619][T32478] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.672029][T32478] device bridge_slave_0 entered promiscuous mode [ 1662.687141][T32478] bridge0: port 2(bridge_slave_1) entered blocking state [ 1662.699643][T32478] bridge0: port 2(bridge_slave_1) entered disabled state [ 1662.709018][T32478] device bridge_slave_1 entered promiscuous mode [ 1662.728010][T32478] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1662.738522][T32478] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1662.755458][T32478] team0: Port device team_slave_0 added [ 1662.762773][T32478] team0: Port device team_slave_1 added [ 1662.826113][T32478] device hsr_slave_0 entered promiscuous mode [ 1662.874403][T32478] device hsr_slave_1 entered promiscuous mode [ 1662.942375][T32478] bridge0: port 2(bridge_slave_1) entered blocking state [ 1662.949525][T32478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1662.956933][T32478] bridge0: port 1(bridge_slave_0) entered blocking state [ 1662.964065][T32478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1663.043458][T32478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1663.065833][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1663.077005][T20875] bridge0: port 1(bridge_slave_0) entered disabled state [ 1663.085950][T20875] bridge0: port 2(bridge_slave_1) entered disabled state [ 1663.097404][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1663.110193][T32478] 8021q: adding VLAN 0 to HW filter on device team0 [ 1663.123715][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1663.132756][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1663.139881][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1663.159043][T32481] IPVS: ftp: loaded support on port[0] = 21 [ 1663.391656][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1663.402053][T20875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1663.409253][T20875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1663.566246][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1663.578188][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1663.595735][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1663.604536][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1663.613003][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1663.622167][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1663.750390][T32478] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1663.762137][T32478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1663.778275][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1663.787727][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1664.086804][T32481] chnl_net:caif_netlink_parms(): no params data found [ 1664.241712][T32481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1664.249130][T32481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1664.257362][T32481] device bridge_slave_0 entered promiscuous mode [ 1664.265491][T32481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1664.272522][T32481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1664.280642][T32481] device bridge_slave_1 entered promiscuous mode [ 1664.419341][T32478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1664.429295][T32481] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1664.446417][T32481] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1664.610213][T32481] team0: Port device team_slave_0 added [ 1664.631827][T32481] team0: Port device team_slave_1 added 15:56:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1664.896041][T32481] device hsr_slave_0 entered promiscuous mode [ 1664.954852][T32481] device hsr_slave_1 entered promiscuous mode [ 1664.995449][ T7] device bridge_slave_1 left promiscuous mode [ 1665.001714][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1665.064614][ T7] device bridge_slave_0 left promiscuous mode [ 1665.070784][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1665.125387][ T7] device bridge_slave_1 left promiscuous mode [ 1665.131543][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1665.185041][ T7] device bridge_slave_0 left promiscuous mode [ 1665.191214][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1668.449401][ T7] device hsr_slave_1 left promiscuous mode [ 1668.509335][ T7] device hsr_slave_0 left promiscuous mode [ 1668.569039][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1668.580524][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1668.592924][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1668.630983][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1668.720780][ T7] bond0 (unregistering): Released all slaves [ 1668.876096][ T7] device hsr_slave_1 left promiscuous mode [ 1668.927357][ T7] device hsr_slave_0 left promiscuous mode [ 1668.979649][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1668.991063][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1669.003948][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1669.041027][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1669.131761][ T7] bond0 (unregistering): Released all slaves [ 1669.455337][T32481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1669.477226][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1669.493203][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1669.505007][T32481] 8021q: adding VLAN 0 to HW filter on device team0 [ 1669.523030][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1669.532195][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1669.546811][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1669.553939][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1669.573991][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1669.581895][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1669.590541][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1669.598911][ T3486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1669.605998][ T3486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1669.614557][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1669.623009][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1669.631674][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1669.641006][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1669.653046][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1669.671072][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1669.679560][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1669.696034][T32481] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1669.707513][T32481] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1669.720036][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1669.729131][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1669.737632][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1669.746213][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1669.755418][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1669.772905][T32481] 8021q: adding VLAN 0 to HW filter on device batadv0 15:56:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x0]}) 15:56:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x0, 0x126, 0x2]}) 15:56:51 executing program 5: r0 = socket$packet(0x11, 0x40000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2da) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc, 0x80, 0x0}}], 0x1, 0x0) 15:56:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5d) 15:56:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:56:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5e) 15:56:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x8, 0x5, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) inotify_init() ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x2, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$loop(0x0, 0x9b4, 0x10000) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd84) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r4 = msgget$private(0x0, 0x10) r5 = getuid() getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @empty}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) r10 = fcntl$getown(r3, 0x9) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x20240, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000480)={{0x7, r5, r6, r7, r8, 0x8, 0xc6}, 0x6, 0x7fffffff, 0x3f, 0x26cb, 0x6000, 0x7, r9, r10}) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, 0x0) 15:56:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x5f) 15:56:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:56:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x60) 15:56:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x61) 15:56:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x0]}) [ 1672.287312][T32541] IPVS: ftp: loaded support on port[0] = 21 [ 1672.372737][T32541] chnl_net:caif_netlink_parms(): no params data found [ 1672.410488][T32541] bridge0: port 1(bridge_slave_0) entered blocking state [ 1672.418159][T32541] bridge0: port 1(bridge_slave_0) entered disabled state [ 1672.426394][T32541] device bridge_slave_0 entered promiscuous mode [ 1672.435692][T32541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1672.442820][T32541] bridge0: port 2(bridge_slave_1) entered disabled state [ 1672.451071][T32541] device bridge_slave_1 entered promiscuous mode [ 1672.475908][T32541] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1672.486316][T32541] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1672.509724][T32541] team0: Port device team_slave_0 added [ 1672.520767][T32541] team0: Port device team_slave_1 added [ 1672.597952][T32541] device hsr_slave_0 entered promiscuous mode [ 1672.644113][T32541] device hsr_slave_1 entered promiscuous mode [ 1672.751894][T32541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1672.759038][T32541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1672.766463][T32541] bridge0: port 1(bridge_slave_0) entered blocking state [ 1672.773530][T32541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1672.812959][T32544] IPVS: ftp: loaded support on port[0] = 21 [ 1672.881476][T32541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1672.895954][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1672.904866][ T3486] bridge0: port 1(bridge_slave_0) entered disabled state [ 1672.912395][ T3486] bridge0: port 2(bridge_slave_1) entered disabled state [ 1672.920970][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1672.936746][T32541] 8021q: adding VLAN 0 to HW filter on device team0 [ 1673.219537][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1673.232728][T14520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.239859][T14520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1673.280810][T32544] chnl_net:caif_netlink_parms(): no params data found [ 1673.313557][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1673.321972][ T3486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1673.329062][ T3486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1673.482217][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1673.496893][T32546] IPVS: ftp: loaded support on port[0] = 21 [ 1673.501297][T32541] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1673.515315][T32541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1673.526817][T32544] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.537467][T32544] bridge0: port 1(bridge_slave_0) entered disabled state [ 1673.545361][T32544] device bridge_slave_0 entered promiscuous mode [ 1673.672467][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1673.680526][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1673.688948][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1673.697596][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1673.705981][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1673.715730][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1673.724036][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1673.732240][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1673.743266][T32544] bridge0: port 2(bridge_slave_1) entered blocking state [ 1673.751308][T32544] bridge0: port 2(bridge_slave_1) entered disabled state [ 1673.759143][T32544] device bridge_slave_1 entered promiscuous mode [ 1673.903534][T32541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1673.943670][T32544] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1674.104315][T32544] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1674.129272][T32544] team0: Port device team_slave_0 added [ 1674.139448][T32544] team0: Port device team_slave_1 added [ 1674.427185][T32544] device hsr_slave_0 entered promiscuous mode [ 1674.454130][T32544] device hsr_slave_1 entered promiscuous mode [ 1675.011354][T32546] chnl_net:caif_netlink_parms(): no params data found [ 1675.181907][T32546] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.189289][T32546] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.197865][T32546] device bridge_slave_0 entered promiscuous mode [ 1675.205782][T32546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.212900][T32546] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.220889][T32546] device bridge_slave_1 entered promiscuous mode [ 1675.243156][T29853] device bridge_slave_1 left promiscuous mode [ 1675.249530][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.316336][T29853] device bridge_slave_0 left promiscuous mode [ 1675.322537][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.365494][T29853] device bridge_slave_1 left promiscuous mode [ 1675.371649][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.415330][T29853] device bridge_slave_0 left promiscuous mode [ 1675.421483][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1678.815964][T29853] device hsr_slave_1 left promiscuous mode [ 1678.859474][T29853] device hsr_slave_0 left promiscuous mode [ 1678.922310][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1678.933209][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1678.946040][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1679.000583][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1679.092754][T29853] bond0 (unregistering): Released all slaves [ 1679.247187][T29853] device hsr_slave_1 left promiscuous mode [ 1679.308098][T29853] device hsr_slave_0 left promiscuous mode [ 1679.386996][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1679.400148][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1679.413096][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1679.457340][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1679.542040][T29853] bond0 (unregistering): Released all slaves [ 1679.628585][T32546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1679.639852][T32546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1679.678416][T32544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1679.686462][T32546] team0: Port device team_slave_0 added [ 1679.694812][T32546] team0: Port device team_slave_1 added [ 1679.704941][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1679.712612][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1679.796967][T32546] device hsr_slave_0 entered promiscuous mode [ 1679.834093][T32546] device hsr_slave_1 entered promiscuous mode [ 1679.886950][T32544] 8021q: adding VLAN 0 to HW filter on device team0 [ 1679.898893][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1679.908787][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1679.917286][T20875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1679.924374][T20875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1679.925224][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1679.948473][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1679.958407][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1679.967140][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1679.974283][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1679.993891][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1680.002597][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1680.011894][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1680.020520][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1680.029004][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1680.037901][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1680.046509][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1680.055687][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1680.063842][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1680.072006][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1680.081853][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1680.092845][T32544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1680.143596][T32544] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1680.183473][T32546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1680.290821][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1680.304481][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1680.315540][T32546] 8021q: adding VLAN 0 to HW filter on device team0 [ 1680.377973][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1680.392818][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1680.401729][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1680.408879][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1680.417758][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1680.426842][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1680.435940][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1680.443033][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1680.466508][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1680.475917][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1680.485322][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1680.494626][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1680.503402][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1680.538903][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1680.563691][T32546] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1680.590561][T32546] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1680.618727][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:57:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x0, 0x126, 0x2]}) 15:57:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x62) 15:57:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x34000, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 15:57:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1680.642903][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1680.664211][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1680.699255][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:57:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x63) [ 1680.744572][T32546] 8021q: adding VLAN 0 to HW filter on device batadv0 15:57:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x4000, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"/745], 0x2e9) write$binfmt_elf64(r1, &(0x7f0000002100)=ANY=[@ANYBLOB="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"], 0x3f2) 15:57:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x64) 15:57:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:02 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x65) 15:57:02 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x66) 15:57:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x0]}) 15:57:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x0, 0x126, 0x2]}) 15:57:03 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x67) 15:57:03 executing program 5: [ 1683.073957][T32727] IPVS: ftp: loaded support on port[0] = 21 [ 1683.171521][T32727] chnl_net:caif_netlink_parms(): no params data found [ 1683.208971][T32727] bridge0: port 1(bridge_slave_0) entered blocking state [ 1683.217045][T32727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1683.225521][T32727] device bridge_slave_0 entered promiscuous mode [ 1683.235227][T32727] bridge0: port 2(bridge_slave_1) entered blocking state [ 1683.242382][T32727] bridge0: port 2(bridge_slave_1) entered disabled state [ 1683.250815][T32727] device bridge_slave_1 entered promiscuous mode [ 1683.276013][T32727] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1683.286814][T32727] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1683.311088][T32727] team0: Port device team_slave_0 added [ 1683.319434][T32727] team0: Port device team_slave_1 added [ 1683.387108][T32727] device hsr_slave_0 entered promiscuous mode [ 1683.424267][T32727] device hsr_slave_1 entered promiscuous mode [ 1683.513059][T32727] bridge0: port 2(bridge_slave_1) entered blocking state [ 1683.520161][T32727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1683.527568][T32727] bridge0: port 1(bridge_slave_0) entered blocking state [ 1683.534644][T32727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1683.585959][T32727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1683.600554][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1683.610225][T14520] bridge0: port 1(bridge_slave_0) entered disabled state [ 1683.618761][T14520] bridge0: port 2(bridge_slave_1) entered disabled state [ 1683.650741][T32727] 8021q: adding VLAN 0 to HW filter on device team0 [ 1683.662117][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1683.670708][T14520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1683.677808][T14520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1683.691287][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1683.699938][T14405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1683.707040][T14405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1683.727915][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1683.736491][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1683.746482][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1683.757932][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1683.771686][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1683.782968][T32727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1683.825216][T32727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1683.868432][T32732] IPVS: ftp: loaded support on port[0] = 21 15:57:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:57:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x2]}) 15:57:05 executing program 5: 15:57:05 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x68) 15:57:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:05 executing program 5: 15:57:05 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x69) 15:57:05 executing program 5: 15:57:05 executing program 5: [ 1685.969053][T32732] chnl_net:caif_netlink_parms(): no params data found [ 1686.003613][T32757] IPVS: ftp: loaded support on port[0] = 21 [ 1686.256434][T32732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1686.263516][T32732] bridge0: port 1(bridge_slave_0) entered disabled state [ 1686.271749][T32732] device bridge_slave_0 entered promiscuous mode [ 1686.282552][T32732] bridge0: port 2(bridge_slave_1) entered blocking state [ 1686.289679][T32732] bridge0: port 2(bridge_slave_1) entered disabled state [ 1686.297613][T32732] device bridge_slave_1 entered promiscuous mode [ 1686.328287][T32732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1686.339292][T32732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1686.679482][T32732] team0: Port device team_slave_0 added [ 1686.691300][T32732] team0: Port device team_slave_1 added [ 1686.711810][T32759] IPVS: ftp: loaded support on port[0] = 21 [ 1687.325674][T32732] device hsr_slave_0 entered promiscuous mode [ 1687.364342][T32732] device hsr_slave_1 entered promiscuous mode [ 1687.449221][T32757] chnl_net:caif_netlink_parms(): no params data found [ 1687.760547][T32759] chnl_net:caif_netlink_parms(): no params data found [ 1688.072073][T32757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1688.080806][T32757] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.089191][T32757] device bridge_slave_0 entered promiscuous mode [ 1688.103238][T32757] bridge0: port 2(bridge_slave_1) entered blocking state [ 1688.111830][T32757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.120498][T32757] device bridge_slave_1 entered promiscuous mode [ 1688.130076][T29853] device bridge_slave_1 left promiscuous mode [ 1688.137255][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.195295][T29853] device bridge_slave_0 left promiscuous mode [ 1688.201518][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.256730][T29853] device bridge_slave_1 left promiscuous mode [ 1688.262986][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.335030][T29853] device bridge_slave_0 left promiscuous mode [ 1688.341346][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.385898][T29853] device bridge_slave_1 left promiscuous mode [ 1688.392127][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.435492][T29853] device bridge_slave_0 left promiscuous mode [ 1688.441676][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.475908][T29853] device bridge_slave_1 left promiscuous mode [ 1688.482077][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.535074][T29853] device bridge_slave_0 left promiscuous mode [ 1688.541270][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1695.577145][T29853] device hsr_slave_1 left promiscuous mode [ 1695.629180][T29853] device hsr_slave_0 left promiscuous mode [ 1695.676882][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1695.690024][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1695.702080][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1695.741210][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1695.841684][T29853] bond0 (unregistering): Released all slaves [ 1695.977023][T29853] device hsr_slave_1 left promiscuous mode [ 1696.029561][T29853] device hsr_slave_0 left promiscuous mode [ 1696.099084][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1696.110715][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1696.123703][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1696.169657][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1696.268051][T29853] bond0 (unregistering): Released all slaves [ 1696.447248][T29853] device hsr_slave_1 left promiscuous mode [ 1696.489590][T29853] device hsr_slave_0 left promiscuous mode [ 1696.537334][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1696.550672][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1696.561970][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1696.603730][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1696.693168][T29853] bond0 (unregistering): Released all slaves [ 1696.876223][T29853] device hsr_slave_1 left promiscuous mode [ 1696.918544][T29853] device hsr_slave_0 left promiscuous mode [ 1696.997989][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1697.009520][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1697.022750][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1697.087893][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1697.172373][T29853] bond0 (unregistering): Released all slaves [ 1697.298749][T32759] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.307553][T32759] bridge0: port 1(bridge_slave_0) entered disabled state [ 1697.315512][T32759] device bridge_slave_0 entered promiscuous mode [ 1697.333724][T32759] bridge0: port 2(bridge_slave_1) entered blocking state [ 1697.343441][T32759] bridge0: port 2(bridge_slave_1) entered disabled state [ 1697.351818][T32759] device bridge_slave_1 entered promiscuous mode [ 1697.369004][T32757] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1697.387077][T32757] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1697.408042][T32759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1697.430239][T32759] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1697.461386][T32757] team0: Port device team_slave_0 added [ 1697.476018][T32732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1697.490793][T32759] team0: Port device team_slave_0 added [ 1697.497912][T32757] team0: Port device team_slave_1 added [ 1697.509473][T32759] team0: Port device team_slave_1 added [ 1697.607102][T32759] device hsr_slave_0 entered promiscuous mode [ 1697.684322][T32759] device hsr_slave_1 entered promiscuous mode [ 1697.805839][T32757] device hsr_slave_0 entered promiscuous mode [ 1697.854286][T32757] device hsr_slave_1 entered promiscuous mode [ 1697.899640][T32732] 8021q: adding VLAN 0 to HW filter on device team0 [ 1697.926408][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1697.934814][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1697.968576][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1697.977879][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1697.987553][T14405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.994691][T14405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1698.002352][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1698.011553][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1698.020056][T14405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.027136][T14405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1698.035676][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1698.044634][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1698.053036][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1698.061665][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1698.070060][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1698.078787][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1698.114112][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1698.121941][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1698.129924][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1698.138485][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1698.147480][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1698.155841][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1698.166245][T32732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1698.209333][T32759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1698.225313][T32732] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1698.251671][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1698.260732][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1698.271564][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1698.285261][T32757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1698.294319][T32759] 8021q: adding VLAN 0 to HW filter on device team0 [ 1698.316079][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1698.325462][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1698.336744][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1698.352723][T32757] 8021q: adding VLAN 0 to HW filter on device team0 [ 1698.373532][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1698.382248][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1698.400281][T14158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.407405][T14158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1698.424177][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1698.432832][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1698.442203][T14158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.449294][T14158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1698.464981][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1698.465512][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1698.485193][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1698.493607][T14158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.500732][T14158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1698.509596][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1698.518779][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1698.527822][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1698.536464][T14158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.543528][T14158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1698.575912][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1698.594037][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1698.602822][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1698.612747][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1698.638837][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1698.657796][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1698.667046][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1698.675919][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 15:57:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x0, 0x126, 0x2]}) 15:57:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6a) 15:57:19 executing program 5: 15:57:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1698.685014][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1698.703700][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1698.720922][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1698.855227][T32757] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1698.918766][T32757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1698.952745][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1698.971676][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1699.003296][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1699.019241][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1699.036857][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1699.056015][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1699.073651][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1699.094299][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1699.111685][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1699.129198][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1699.238301][T32759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1699.284634][T32757] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1699.312833][T32759] 8021q: adding VLAN 0 to HW filter on device batadv0 15:57:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x2]}) 15:57:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(r0, 0x0, &(0x7f0000000080)) recvfrom$inet(r0, 0x0, 0xfdb00090, 0x40002, 0x0, 0x800e006ad) shutdown(r0, 0x0) 15:57:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6b) 15:57:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) 15:57:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6c) 15:57:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6d) 15:57:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e004a6) 15:57:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) 15:57:21 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6e) 15:57:21 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x6f) [ 1701.065958][ T464] IPVS: ftp: loaded support on port[0] = 21 [ 1701.260374][ T464] chnl_net:caif_netlink_parms(): no params data found [ 1701.302014][ T464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1701.309646][ T464] bridge0: port 1(bridge_slave_0) entered disabled state [ 1701.318278][ T464] device bridge_slave_0 entered promiscuous mode [ 1701.327980][ T464] bridge0: port 2(bridge_slave_1) entered blocking state [ 1701.335332][ T464] bridge0: port 2(bridge_slave_1) entered disabled state [ 1701.343304][ T464] device bridge_slave_1 entered promiscuous mode [ 1701.368661][ T464] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1701.379545][ T464] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1701.417279][ T464] team0: Port device team_slave_0 added [ 1701.424323][ T464] team0: Port device team_slave_1 added [ 1701.497033][ T464] device hsr_slave_0 entered promiscuous mode [ 1701.541198][ T464] device hsr_slave_1 entered promiscuous mode [ 1701.620185][ T464] bridge0: port 2(bridge_slave_1) entered blocking state [ 1701.627344][ T464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1701.634771][ T464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1701.641846][ T464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1701.733101][ T464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1701.759315][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1701.772704][ T9007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1701.790000][ T9007] bridge0: port 2(bridge_slave_1) entered disabled state [ 1701.812903][ T464] 8021q: adding VLAN 0 to HW filter on device team0 [ 1701.833348][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1701.849669][ T9007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1701.856825][ T9007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1701.892844][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1701.911752][ T9007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1701.918885][ T9007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1701.953892][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1701.962644][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1701.971726][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1701.980280][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1701.991550][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1702.009337][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1702.052380][ T464] 8021q: adding VLAN 0 to HW filter on device batadv0 15:57:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) 15:57:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x70) 15:57:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:57:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, 0x0, 0x20000000009) 15:57:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x2]}) 15:57:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x71) 15:57:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x72) 15:57:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x0, 0x0, 0x126, 0x2]}) 15:57:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x73) 15:57:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x74) 15:57:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x75) 15:57:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x0, 0x0, 0x126, 0x2]}) 15:57:24 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x76) [ 1704.282666][ T717] IPVS: ftp: loaded support on port[0] = 21 [ 1704.739719][ T717] chnl_net:caif_netlink_parms(): no params data found [ 1705.038382][ T717] bridge0: port 1(bridge_slave_0) entered blocking state [ 1705.046582][ T717] bridge0: port 1(bridge_slave_0) entered disabled state [ 1705.054477][ T717] device bridge_slave_0 entered promiscuous mode [ 1705.062508][ T717] bridge0: port 2(bridge_slave_1) entered blocking state [ 1705.070187][ T717] bridge0: port 2(bridge_slave_1) entered disabled state [ 1705.078368][ T717] device bridge_slave_1 entered promiscuous mode [ 1705.101823][ T717] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1705.112653][ T717] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1705.115472][ T720] IPVS: ftp: loaded support on port[0] = 21 [ 1705.357032][ T717] team0: Port device team_slave_0 added [ 1705.373166][ T717] team0: Port device team_slave_1 added [ 1705.598181][ T717] device hsr_slave_0 entered promiscuous mode [ 1705.674246][ T717] device hsr_slave_1 entered promiscuous mode [ 1705.973096][ T720] chnl_net:caif_netlink_parms(): no params data found [ 1706.252382][ T720] bridge0: port 1(bridge_slave_0) entered blocking state [ 1706.259620][ T720] bridge0: port 1(bridge_slave_0) entered disabled state [ 1706.267762][ T720] device bridge_slave_0 entered promiscuous mode [ 1706.276185][ T720] bridge0: port 2(bridge_slave_1) entered blocking state [ 1706.283301][ T720] bridge0: port 2(bridge_slave_1) entered disabled state [ 1706.291394][ T720] device bridge_slave_1 entered promiscuous mode [ 1706.306145][T29853] device bridge_slave_1 left promiscuous mode [ 1706.312356][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1706.374955][T29853] device bridge_slave_0 left promiscuous mode [ 1706.381175][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1706.415904][T29853] device bridge_slave_1 left promiscuous mode [ 1706.422069][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1706.464642][T29853] device bridge_slave_0 left promiscuous mode [ 1706.470795][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1706.525518][T29853] device bridge_slave_1 left promiscuous mode [ 1706.531690][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1706.584632][T29853] device bridge_slave_0 left promiscuous mode [ 1706.590778][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1711.767217][T29853] device hsr_slave_1 left promiscuous mode [ 1711.817491][T29853] device hsr_slave_0 left promiscuous mode [ 1711.889198][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1711.900878][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1711.913123][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1711.950932][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1712.042489][T29853] bond0 (unregistering): Released all slaves [ 1712.197726][T29853] device hsr_slave_1 left promiscuous mode [ 1712.257674][T29853] device hsr_slave_0 left promiscuous mode [ 1712.309648][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1712.321616][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1712.334778][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1712.371587][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1712.463320][T29853] bond0 (unregistering): Released all slaves [ 1712.577089][T29853] device hsr_slave_1 left promiscuous mode [ 1712.619635][T29853] device hsr_slave_0 left promiscuous mode [ 1712.679396][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1712.690892][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1712.703465][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1712.742306][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1712.825633][T29853] bond0 (unregistering): Released all slaves [ 1712.939180][ T720] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1712.949735][ T720] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1712.981948][ T720] team0: Port device team_slave_0 added [ 1712.991027][ T720] team0: Port device team_slave_1 added [ 1713.057180][ T720] device hsr_slave_0 entered promiscuous mode [ 1713.084123][ T720] device hsr_slave_1 entered promiscuous mode [ 1713.167403][ T717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1713.187071][ T717] 8021q: adding VLAN 0 to HW filter on device team0 [ 1713.198909][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1713.207025][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1713.223444][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1713.232421][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1713.241620][ T9007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1713.248735][ T9007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1713.256989][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1713.266003][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1713.274573][ T9007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1713.281632][ T9007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1713.291149][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1713.299349][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1713.317683][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1713.329432][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1713.343687][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1713.352946][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1713.372480][ T717] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1713.384187][ T717] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1713.410974][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1713.419668][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1713.429274][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1713.437945][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1713.446826][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1713.455378][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1713.463548][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1713.482675][ T717] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1713.527442][ T720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1713.550898][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1713.559439][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1713.567667][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1713.579342][ T720] 8021q: adding VLAN 0 to HW filter on device team0 15:57:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000040)="11dca5055e0105ec7be070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/196, 0xc4}], 0x1, 0x0) 15:57:34 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x77) [ 1714.033006][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1714.042580][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1714.051164][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1714.058308][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1714.084135][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1714.092996][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1714.101668][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1714.108782][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1714.117363][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1714.126902][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1714.147385][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1714.174915][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1714.183744][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1714.204977][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1714.254503][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1714.263438][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1714.285743][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1714.294462][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1714.302946][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1714.312155][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1714.322017][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1714.362590][ T720] 8021q: adding VLAN 0 to HW filter on device batadv0 15:57:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x0, 0x2]}) 15:57:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:57:35 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x78) 15:57:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x0, 0x0, 0x126, 0x2]}) 15:57:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:35 executing program 5: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x5) 15:57:35 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x79) 15:57:36 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x7a) 15:57:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) pipe(&(0x7f00000001c0)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 15:57:36 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x7b) 15:57:36 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x7c) 15:57:36 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x7d) 15:57:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x0, 0x2]}) [ 1716.692072][ T1085] IPVS: ftp: loaded support on port[0] = 21 [ 1716.771305][ T1085] chnl_net:caif_netlink_parms(): no params data found [ 1716.800201][ T1085] bridge0: port 1(bridge_slave_0) entered blocking state [ 1716.807546][ T1085] bridge0: port 1(bridge_slave_0) entered disabled state [ 1716.815814][ T1085] device bridge_slave_0 entered promiscuous mode [ 1716.823364][ T1085] bridge0: port 2(bridge_slave_1) entered blocking state [ 1716.831003][ T1085] bridge0: port 2(bridge_slave_1) entered disabled state [ 1716.839162][ T1085] device bridge_slave_1 entered promiscuous mode [ 1717.439719][ T1090] IPVS: ftp: loaded support on port[0] = 21 [ 1717.441002][ T1089] IPVS: ftp: loaded support on port[0] = 21 [ 1717.454666][ T1085] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1717.486964][ T1085] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1717.831321][ T1085] team0: Port device team_slave_0 added [ 1717.841480][ T1085] team0: Port device team_slave_1 added [ 1718.147914][ T1085] device hsr_slave_0 entered promiscuous mode [ 1718.204447][ T1085] device hsr_slave_1 entered promiscuous mode [ 1718.579612][ T1090] chnl_net:caif_netlink_parms(): no params data found [ 1718.899201][ T1089] chnl_net:caif_netlink_parms(): no params data found [ 1718.911061][ T1090] bridge0: port 1(bridge_slave_0) entered blocking state [ 1718.919863][ T1090] bridge0: port 1(bridge_slave_0) entered disabled state [ 1718.929839][ T1090] device bridge_slave_0 entered promiscuous mode [ 1718.939153][ T1090] bridge0: port 2(bridge_slave_1) entered blocking state [ 1718.949676][ T1090] bridge0: port 2(bridge_slave_1) entered disabled state [ 1718.958379][ T1090] device bridge_slave_1 entered promiscuous mode [ 1719.004290][ T1090] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1719.015682][ T1090] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1719.339139][ T1089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1719.346671][ T1089] bridge0: port 1(bridge_slave_0) entered disabled state [ 1719.354524][ T1089] device bridge_slave_0 entered promiscuous mode [ 1719.362618][ T1089] bridge0: port 2(bridge_slave_1) entered blocking state [ 1719.370255][ T1089] bridge0: port 2(bridge_slave_1) entered disabled state [ 1719.378420][ T1089] device bridge_slave_1 entered promiscuous mode [ 1719.410645][ T1089] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1719.423737][ T1090] team0: Port device team_slave_0 added [ 1719.682817][ T1089] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1719.700790][ T1090] team0: Port device team_slave_1 added [ 1720.038068][ T1090] device hsr_slave_0 entered promiscuous mode [ 1720.104128][ T1090] device hsr_slave_1 entered promiscuous mode [ 1720.169826][ T1089] team0: Port device team_slave_0 added [ 1720.181236][ T1089] team0: Port device team_slave_1 added [ 1720.496630][ T1089] device hsr_slave_0 entered promiscuous mode [ 1720.534194][ T1089] device hsr_slave_1 entered promiscuous mode [ 1720.596965][ T1085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1720.611238][T29853] device bridge_slave_1 left promiscuous mode [ 1720.622718][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1720.695081][T29853] device bridge_slave_0 left promiscuous mode [ 1720.701312][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1720.765636][T29853] device bridge_slave_1 left promiscuous mode [ 1720.771794][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1720.815228][T29853] device bridge_slave_0 left promiscuous mode [ 1720.821449][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1720.865225][T29853] device bridge_slave_1 left promiscuous mode [ 1720.871381][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1720.915214][T29853] device bridge_slave_0 left promiscuous mode [ 1720.921394][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1720.995660][T29853] device bridge_slave_1 left promiscuous mode [ 1721.001807][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1721.058759][T29853] device bridge_slave_0 left promiscuous mode [ 1721.065017][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1727.925897][T29853] device hsr_slave_1 left promiscuous mode [ 1728.009325][T29853] device hsr_slave_0 left promiscuous mode [ 1728.077397][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1728.091438][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1728.102602][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1728.150380][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1728.222811][T29853] bond0 (unregistering): Released all slaves [ 1728.357396][T29853] device hsr_slave_1 left promiscuous mode [ 1728.399570][T29853] device hsr_slave_0 left promiscuous mode [ 1728.449703][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1728.461571][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1728.474835][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1728.508810][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1728.589553][T29853] bond0 (unregistering): Released all slaves [ 1728.708626][T29853] device hsr_slave_1 left promiscuous mode [ 1728.769959][T29853] device hsr_slave_0 left promiscuous mode [ 1728.828953][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1728.840463][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1728.852340][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1728.918946][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1729.012917][T29853] bond0 (unregistering): Released all slaves [ 1729.167655][T29853] device hsr_slave_1 left promiscuous mode [ 1729.208064][T29853] device hsr_slave_0 left promiscuous mode [ 1729.267337][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1729.280377][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1729.291788][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1729.328126][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1729.421914][T29853] bond0 (unregistering): Released all slaves [ 1729.549714][ T1090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1729.561416][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1729.569277][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1729.579016][ T1085] 8021q: adding VLAN 0 to HW filter on device team0 [ 1729.598882][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1729.607472][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1729.616646][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.623686][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1729.631797][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1729.641118][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1729.649523][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.656631][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1729.665062][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1729.680261][ T1090] 8021q: adding VLAN 0 to HW filter on device team0 [ 1729.696333][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1729.704512][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1729.715040][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1729.724597][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1729.755327][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1729.768040][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1729.777615][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.784702][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1729.792364][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1729.802134][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1729.810557][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.817657][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1729.825697][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1729.834453][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1729.842708][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1729.851373][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1729.860058][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1729.868368][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1729.893986][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1729.902479][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1729.910774][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1729.919994][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1729.929132][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1729.937720][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1729.954032][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1729.962397][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1729.971706][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1729.980324][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1729.988850][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1729.997985][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1730.007045][ T9007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1730.020653][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1730.029156][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1730.047298][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1730.060389][ T1089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1730.074365][ T1090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1730.095718][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1730.103391][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1730.114973][ T1089] 8021q: adding VLAN 0 to HW filter on device team0 [ 1730.132655][ T1085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1730.152502][ T1090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1730.165037][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1730.174231][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1730.182693][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1730.189824][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1730.215617][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1730.225839][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1730.239214][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1730.248543][T20875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1730.255680][T20875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1730.263423][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1730.275928][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1730.323446][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1730.340398][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1730.366428][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1730.381482][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1730.391693][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1730.407163][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1730.418977][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1730.462232][ T1089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1730.489298][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1730.517434][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1730.531417][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1730.650226][ T1089] 8021q: adding VLAN 0 to HW filter on device batadv0 15:57:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x0, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:57:52 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x7e) 15:57:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:57:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x0, 0x2]}) 15:57:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) 15:57:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:57:52 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x82) 15:57:53 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) 15:57:53 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x83) 15:57:53 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x84) 15:57:53 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x85) 15:57:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x0, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:57:53 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x86) 15:57:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x0, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:57:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x8, 0x5, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) r2 = inotify_init() ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x2, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$loop(0x0, 0x9b4, 0x10000) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd84) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r5 = msgget$private(0x0, 0x10) r6 = getuid() getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @empty}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) r9 = inotify_add_watch(r4, &(0x7f0000000580)='./file0/file0\x00', 0x4) inotify_rm_watch(r2, r9) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) r12 = fcntl$getown(r4, 0x9) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x20240, 0x0) clock_gettime(0x5, &(0x7f0000000540)) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000480)={{0x7, r6, r7, r8, r10, 0x8, 0xc6}, 0x6, 0x7fffffff, 0x3f, 0x26cb, 0x6000, 0x7, r11, r12}) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) [ 1733.757780][ T1358] IPVS: ftp: loaded support on port[0] = 21 [ 1733.828671][ T1358] chnl_net:caif_netlink_parms(): no params data found [ 1733.866803][ T1358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1733.874181][ T1358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1733.881761][ T1358] device bridge_slave_0 entered promiscuous mode [ 1733.900962][ T1358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1733.909234][ T1358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1733.922612][ T1358] device bridge_slave_1 entered promiscuous mode [ 1733.957011][ T1358] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1733.967332][ T1358] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1733.989170][ T1358] team0: Port device team_slave_0 added [ 1733.997786][ T1358] team0: Port device team_slave_1 added [ 1734.045704][ T1358] device hsr_slave_0 entered promiscuous mode [ 1734.124364][ T1358] device hsr_slave_1 entered promiscuous mode [ 1734.204858][ T1358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1734.212010][ T1358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1734.219440][ T1358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1734.226723][ T1358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1734.677988][ T1363] IPVS: ftp: loaded support on port[0] = 21 [ 1734.681828][ T1365] IPVS: ftp: loaded support on port[0] = 21 [ 1734.694268][ T1362] IPVS: ftp: loaded support on port[0] = 21 [ 1734.909955][T14159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1734.917925][T14159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1735.642504][ T1365] chnl_net:caif_netlink_parms(): no params data found [ 1735.651632][ T1363] chnl_net:caif_netlink_parms(): no params data found [ 1736.184693][ T1363] bridge0: port 1(bridge_slave_0) entered blocking state [ 1736.191874][ T1363] bridge0: port 1(bridge_slave_0) entered disabled state [ 1736.200552][ T1363] device bridge_slave_0 entered promiscuous mode [ 1736.250808][ T1358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1736.260998][ T1363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1736.270621][ T1363] bridge0: port 2(bridge_slave_1) entered disabled state [ 1736.278991][ T1363] device bridge_slave_1 entered promiscuous mode [ 1736.286120][ T1365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1736.293191][ T1365] bridge0: port 1(bridge_slave_0) entered disabled state [ 1736.310481][ T1365] device bridge_slave_0 entered promiscuous mode [ 1736.320704][ T1365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1736.327869][ T1365] bridge0: port 2(bridge_slave_1) entered disabled state [ 1736.335896][ T1365] device bridge_slave_1 entered promiscuous mode [ 1736.542214][ T1362] chnl_net:caif_netlink_parms(): no params data found [ 1736.571011][ T1363] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1736.590600][ T1363] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1736.810207][ T1365] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1736.824083][ T1365] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1736.837767][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1736.846042][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1736.865013][ T1363] team0: Port device team_slave_0 added [ 1736.870947][ T1362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1736.878468][ T1362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1736.887325][ T1362] device bridge_slave_0 entered promiscuous mode [ 1736.901305][ T1362] bridge0: port 2(bridge_slave_1) entered blocking state [ 1736.908513][ T1362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1736.916831][ T1362] device bridge_slave_1 entered promiscuous mode [ 1736.939647][ T1362] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1736.951856][ T1363] team0: Port device team_slave_1 added [ 1736.966086][ T1362] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1736.987207][T29853] device bridge_slave_1 left promiscuous mode [ 1736.994766][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.044826][T29853] device bridge_slave_0 left promiscuous mode [ 1737.050993][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.096244][T29853] device bridge_slave_1 left promiscuous mode [ 1737.102415][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.144736][T29853] device bridge_slave_0 left promiscuous mode [ 1737.150887][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.195981][T29853] device bridge_slave_1 left promiscuous mode [ 1737.202193][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.244910][T29853] device bridge_slave_0 left promiscuous mode [ 1737.251063][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.427062][T29853] device hsr_slave_1 left promiscuous mode [ 1742.469686][T29853] device hsr_slave_0 left promiscuous mode [ 1742.510015][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1742.525686][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1742.537059][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1742.587980][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1742.673516][T29853] bond0 (unregistering): Released all slaves [ 1742.797341][T29853] device hsr_slave_1 left promiscuous mode [ 1742.859355][T29853] device hsr_slave_0 left promiscuous mode [ 1742.919013][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1742.930616][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1742.943491][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1742.998442][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1743.078169][T29853] bond0 (unregistering): Released all slaves [ 1743.187004][T29853] device hsr_slave_1 left promiscuous mode [ 1743.229553][T29853] device hsr_slave_0 left promiscuous mode [ 1743.288979][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1743.300708][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1743.313006][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1743.358580][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1743.433488][T29853] bond0 (unregistering): Released all slaves [ 1743.528105][ T1358] 8021q: adding VLAN 0 to HW filter on device team0 [ 1743.539884][ T1365] team0: Port device team_slave_0 added [ 1743.549340][ T1362] team0: Port device team_slave_0 added [ 1743.556631][ T1362] team0: Port device team_slave_1 added [ 1743.625753][ T1363] device hsr_slave_0 entered promiscuous mode [ 1743.674362][ T1363] device hsr_slave_1 entered promiscuous mode [ 1743.725359][ T1365] team0: Port device team_slave_1 added [ 1743.807433][ T1362] device hsr_slave_0 entered promiscuous mode [ 1743.868661][ T1362] device hsr_slave_1 entered promiscuous mode [ 1743.928940][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1743.937930][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1743.946415][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1743.953448][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1743.990148][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1743.998900][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1744.008015][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1744.015115][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1744.022907][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1744.097408][ T1365] device hsr_slave_0 entered promiscuous mode [ 1744.134067][ T1365] device hsr_slave_1 entered promiscuous mode [ 1744.240838][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1744.249914][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1744.258677][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1744.267122][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1744.276140][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1744.286930][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1744.302442][ T1358] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1744.313227][ T1358] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1744.333505][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1744.344961][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1744.353314][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1744.363123][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1744.382989][ T1358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1744.406662][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1744.446501][ T1363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1744.464919][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1744.472715][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1744.490806][ T1363] 8021q: adding VLAN 0 to HW filter on device team0 [ 1744.526545][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1744.538284][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1744.547332][T14158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1744.554444][T14158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1744.562082][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1744.570777][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1744.579302][T14158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1744.586405][T14158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1744.594094][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1744.602717][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1744.630355][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1744.639920][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1744.648662][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1744.656938][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1744.666191][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1744.675504][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1744.706760][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1744.724495][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1744.753297][ T1363] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1744.770245][ T1363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1744.787847][ T1362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1744.796384][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1744.812117][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1744.861508][ T1365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1744.881446][ T1362] 8021q: adding VLAN 0 to HW filter on device team0 [ 1744.935840][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1744.943667][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1744.954396][ T1363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1745.433952][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1745.441729][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1745.456955][ T1365] 8021q: adding VLAN 0 to HW filter on device team0 [ 1745.481054][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1745.491195][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1745.500364][T14405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1745.507497][T14405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1745.563901][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1745.571898][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1745.606931][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1745.632165][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1745.639326][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1745.724766][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1745.764990][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1745.788545][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 15:58:06 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x87) [ 1745.817440][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1745.838264][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1745.845496][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1745.881908][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1745.891537][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1745.901847][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1745.908979][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1745.917819][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1745.926747][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1745.935671][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1745.944959][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1745.994646][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1746.002634][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1746.014042][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1746.022813][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1746.032648][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1746.041930][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1746.056888][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1746.068850][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1746.080575][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1746.092635][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1746.107800][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1746.119600][T15423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1746.140980][ T1365] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1746.161096][ T1365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1746.179008][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1746.197935][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1746.217451][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1746.229438][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1746.241898][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1746.419039][ T1362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1746.456570][ T1365] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1746.513160][ T1362] 8021q: adding VLAN 0 to HW filter on device batadv0 15:58:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) 15:58:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200080000000013, &(0x7f00000001c0)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f0000000080)) setresuid(0x0, 0x0, r1) clone(0x400a000000417c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x14, &(0x7f0000000380)) prlimit64(r3, 0x0, 0x0, 0x0) 15:58:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:07 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x88) 15:58:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x126, 0x2]}) 15:58:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:08 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x89) 15:58:08 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8a) 15:58:08 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8b) 15:58:08 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8c) 15:58:08 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8d) 15:58:08 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8e) 15:58:09 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x8f) 15:58:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) [ 1748.701535][ T1555] IPVS: ftp: loaded support on port[0] = 21 [ 1748.781280][ T1555] chnl_net:caif_netlink_parms(): no params data found [ 1749.298109][ T1555] bridge0: port 1(bridge_slave_0) entered blocking state [ 1749.305567][ T1555] bridge0: port 1(bridge_slave_0) entered disabled state [ 1749.313164][ T1555] device bridge_slave_0 entered promiscuous mode [ 1749.322133][ T1555] bridge0: port 2(bridge_slave_1) entered blocking state [ 1749.329354][ T1555] bridge0: port 2(bridge_slave_1) entered disabled state [ 1749.337327][ T1555] device bridge_slave_1 entered promiscuous mode [ 1749.359248][ T1555] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1749.375636][ T1555] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1749.401700][ T1555] team0: Port device team_slave_0 added [ 1749.415671][ T1555] team0: Port device team_slave_1 added [ 1749.777237][ T1555] device hsr_slave_0 entered promiscuous mode [ 1749.814163][ T1555] device hsr_slave_1 entered promiscuous mode [ 1749.870545][ T1558] IPVS: ftp: loaded support on port[0] = 21 [ 1750.980816][ T1555] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1750.991789][ T1558] chnl_net:caif_netlink_parms(): no params data found [ 1751.033235][ T1558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1751.040792][ T1558] bridge0: port 1(bridge_slave_0) entered disabled state [ 1751.049403][ T1558] device bridge_slave_0 entered promiscuous mode [ 1751.057861][ T1558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1751.065178][ T1558] bridge0: port 2(bridge_slave_1) entered disabled state [ 1751.072808][ T1558] device bridge_slave_1 entered promiscuous mode [ 1751.089866][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1751.098138][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1751.362309][ T1558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1751.372891][ T1558] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1751.389653][ T1555] 8021q: adding VLAN 0 to HW filter on device team0 [ 1751.654329][ T1558] team0: Port device team_slave_0 added [ 1751.664261][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1751.672944][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1751.681519][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1751.688625][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1751.699311][ T1558] team0: Port device team_slave_1 added [ 1751.949956][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1751.973874][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1751.987989][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1751.996613][T14405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1752.003658][T14405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1752.019105][T29853] device bridge_slave_1 left promiscuous mode [ 1752.025568][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1752.085029][T29853] device bridge_slave_0 left promiscuous mode [ 1752.091221][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1752.136201][T29853] device bridge_slave_1 left promiscuous mode [ 1752.142371][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1752.196227][T29853] device bridge_slave_0 left promiscuous mode [ 1752.202452][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1752.246289][T29853] device bridge_slave_1 left promiscuous mode [ 1752.252450][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1752.314975][T29853] device bridge_slave_0 left promiscuous mode [ 1752.321212][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1752.357464][T29853] device bridge_slave_1 left promiscuous mode [ 1752.363651][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1752.395150][T29853] device bridge_slave_0 left promiscuous mode [ 1752.401372][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1759.055839][T29853] device hsr_slave_1 left promiscuous mode [ 1759.117921][T29853] device hsr_slave_0 left promiscuous mode [ 1759.157714][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1759.171747][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1759.183189][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1759.209978][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1759.281251][T29853] bond0 (unregistering): Released all slaves [ 1759.426996][T29853] device hsr_slave_1 left promiscuous mode [ 1759.468324][T29853] device hsr_slave_0 left promiscuous mode [ 1759.517372][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1759.530857][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1759.542095][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1759.578581][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1759.668972][T29853] bond0 (unregistering): Released all slaves [ 1759.848262][T29853] device hsr_slave_1 left promiscuous mode [ 1759.909382][T29853] device hsr_slave_0 left promiscuous mode [ 1759.977744][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1759.990859][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1760.002267][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1760.031029][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1760.121374][T29853] bond0 (unregistering): Released all slaves [ 1760.276000][T29853] device hsr_slave_1 left promiscuous mode [ 1760.328442][T29853] device hsr_slave_0 left promiscuous mode [ 1760.388958][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1760.400563][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1760.411920][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1760.457987][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1760.549980][T29853] bond0 (unregistering): Released all slaves [ 1760.667232][ T1558] device hsr_slave_0 entered promiscuous mode [ 1760.715392][ T1558] device hsr_slave_1 entered promiscuous mode [ 1760.764128][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1760.785922][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1760.795629][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1760.804280][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1760.812528][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1760.821700][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1760.833185][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1760.849105][ T1555] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1760.859810][ T1555] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1760.882138][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1760.891186][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1760.899698][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1760.908644][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1760.924206][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1760.941339][ T1555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1760.986994][ T1558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1761.001182][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1761.010806][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1761.024937][ T1558] 8021q: adding VLAN 0 to HW filter on device team0 [ 1761.041258][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1761.050379][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1761.059084][T20874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1761.066185][T20874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1761.074067][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1761.087142][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1761.096683][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1761.105552][T14520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1761.112648][T14520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1761.153370][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1761.168023][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1761.181429][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1761.190729][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1761.200078][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1761.220348][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1761.229851][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 15:58:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1761.248227][ T1558] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1761.258928][ T1558] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1761.282218][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1761.295908][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1761.305222][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1761.313697][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1761.322899][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1761.336407][ T1558] 8021q: adding VLAN 0 to HW filter on device batadv0 15:58:22 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x90) 15:58:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x650}], 0x10000000000000e0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 15:58:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:58:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x126, 0x2]}) 15:58:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:22 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x91) 15:58:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x92) 15:58:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000000090501ff0080fffdffff2e0a0000000c000100010a00010c000200000000000000"], 0x26}}, 0x0) 15:58:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x93) 15:58:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x94) 15:58:23 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00'}, 0x10) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, 0x0, &(0x7f0000000500)) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 1762.890545][ T1822] IPVS: ftp: loaded support on port[0] = 21 [ 1763.096239][ T1822] chnl_net:caif_netlink_parms(): no params data found [ 1763.153176][ T1822] bridge0: port 1(bridge_slave_0) entered blocking state [ 1763.160871][ T1822] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.174638][ T1822] device bridge_slave_0 entered promiscuous mode [ 1763.182907][ T1822] bridge0: port 2(bridge_slave_1) entered blocking state [ 1763.207001][ T1822] bridge0: port 2(bridge_slave_1) entered disabled state [ 1763.227924][ T1822] device bridge_slave_1 entered promiscuous mode [ 1763.304223][ T1822] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1763.324622][ T1822] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1763.358312][ T1822] team0: Port device team_slave_0 added [ 1763.365904][ T1822] team0: Port device team_slave_1 added [ 1763.436967][ T1822] device hsr_slave_0 entered promiscuous mode [ 1763.484240][ T1822] device hsr_slave_1 entered promiscuous mode [ 1763.550011][ T1822] bridge0: port 2(bridge_slave_1) entered blocking state [ 1763.557153][ T1822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1763.564564][ T1822] bridge0: port 1(bridge_slave_0) entered blocking state [ 1763.571644][ T1822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1763.621924][ T1822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1763.643304][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1763.652919][ T2996] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.677956][ T2996] bridge0: port 2(bridge_slave_1) entered disabled state [ 1763.712811][ T1822] 8021q: adding VLAN 0 to HW filter on device team0 [ 1763.741281][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1763.750331][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1763.757471][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1763.780028][ T1825] IPVS: ftp: loaded support on port[0] = 21 [ 1763.791557][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1763.801213][T20874] bridge0: port 2(bridge_slave_1) entered blocking state [ 1763.808351][T20874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1763.824556][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1763.857715][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1763.870965][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1763.902057][ T1822] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1763.913178][ T1822] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1763.930674][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1763.940993][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1763.955468][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1763.963696][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1763.994125][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1764.009479][ T1822] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1764.086302][ T1825] chnl_net:caif_netlink_parms(): no params data found [ 1764.129250][ T1825] bridge0: port 1(bridge_slave_0) entered blocking state [ 1764.136903][ T1825] bridge0: port 1(bridge_slave_0) entered disabled state [ 1764.145533][ T1825] device bridge_slave_0 entered promiscuous mode [ 1764.153321][ T1825] bridge0: port 2(bridge_slave_1) entered blocking state [ 1764.160545][ T1825] bridge0: port 2(bridge_slave_1) entered disabled state [ 1764.168978][ T1825] device bridge_slave_1 entered promiscuous mode [ 1764.196732][ T1825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1764.216127][ T1825] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1764.260195][ T1825] team0: Port device team_slave_0 added [ 1764.268555][ T1825] team0: Port device team_slave_1 added [ 1764.356970][ T1825] device hsr_slave_0 entered promiscuous mode [ 1764.425068][ T1825] device hsr_slave_1 entered promiscuous mode 15:58:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:25 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x95) 15:58:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x3, 0x126, 0x2]}) [ 1764.489973][ T1825] bridge0: port 2(bridge_slave_1) entered blocking state [ 1764.497117][ T1825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1764.504518][ T1825] bridge0: port 1(bridge_slave_0) entered blocking state [ 1764.511610][ T1825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1764.691363][ T1825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1764.744471][ T1825] 8021q: adding VLAN 0 to HW filter on device team0 [ 1764.763408][ T1841] IPVS: ftp: loaded support on port[0] = 21 [ 1764.772062][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1764.780722][T20874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1764.801227][T20874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1765.378072][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1765.386823][T20874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1765.393966][T20874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1765.401821][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1765.411900][T20874] bridge0: port 2(bridge_slave_1) entered blocking state [ 1765.418988][T20874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1765.446863][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1765.456721][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1765.465910][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1765.475580][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1765.502585][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1765.526791][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1765.546555][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1765.566302][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1765.602947][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1765.613126][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1765.632733][ T1825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1765.708769][ T1841] chnl_net:caif_netlink_parms(): no params data found [ 1765.730319][ T1825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1765.760676][ T1841] bridge0: port 1(bridge_slave_0) entered blocking state [ 1765.769664][ T1841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1765.779024][ T1841] device bridge_slave_0 entered promiscuous mode [ 1765.787746][ T1841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1765.795978][ T1841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1765.804505][ T1841] device bridge_slave_1 entered promiscuous mode [ 1766.193150][ T1841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1766.207083][ T1841] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:58:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:58:27 executing program 5: ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', r0}, 0x10) accept$packet(r0, 0x0, &(0x7f0000000740)) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(r0, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 1766.609216][ T1851] IPVS: ftp: loaded support on port[0] = 21 [ 1766.620987][ T1841] team0: Port device team_slave_0 added [ 1766.921024][ T1841] team0: Port device team_slave_1 added [ 1767.347131][ T1841] device hsr_slave_0 entered promiscuous mode [ 1767.395367][ T1841] device hsr_slave_1 entered promiscuous mode [ 1767.906137][ T1851] chnl_net:caif_netlink_parms(): no params data found [ 1767.946325][ T1851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.953478][ T1851] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.961908][ T1851] device bridge_slave_0 entered promiscuous mode [ 1767.972614][ T1851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.980074][ T1851] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.988343][ T1851] device bridge_slave_1 entered promiscuous mode [ 1768.201338][ T1851] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1768.217991][ T1851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1768.242309][ T1841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1768.438271][ T1851] team0: Port device team_slave_0 added [ 1768.453712][ T1841] 8021q: adding VLAN 0 to HW filter on device team0 [ 1768.463186][ T1851] team0: Port device team_slave_1 added [ 1768.480406][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1768.488822][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1768.747142][ T1851] device hsr_slave_0 entered promiscuous mode [ 1768.784116][ T1851] device hsr_slave_1 entered promiscuous mode [ 1768.855892][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1768.864892][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1768.873195][T14520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1768.880295][T14520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1768.887939][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1768.897364][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1768.905898][T14520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1768.912929][T14520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1768.920546][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1768.929917][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1768.939909][T29853] device bridge_slave_1 left promiscuous mode [ 1768.949643][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.014660][T29853] device bridge_slave_0 left promiscuous mode [ 1769.020807][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1769.076104][T29853] device bridge_slave_1 left promiscuous mode [ 1769.082320][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.134628][T29853] device bridge_slave_0 left promiscuous mode [ 1769.140814][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1769.195491][T29853] device bridge_slave_1 left promiscuous mode [ 1769.201658][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.255033][T29853] device bridge_slave_0 left promiscuous mode [ 1769.261260][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1774.237099][T29853] device hsr_slave_1 left promiscuous mode [ 1774.279772][T29853] device hsr_slave_0 left promiscuous mode [ 1774.339810][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1774.352699][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1774.365591][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1774.398539][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1774.491762][T29853] bond0 (unregistering): Released all slaves [ 1774.646013][T29853] device hsr_slave_1 left promiscuous mode [ 1774.719428][T29853] device hsr_slave_0 left promiscuous mode [ 1774.759709][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1774.771204][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1774.782604][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1774.848008][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1774.923006][T29853] bond0 (unregistering): Released all slaves [ 1775.087615][T29853] device hsr_slave_1 left promiscuous mode [ 1775.130510][T29853] device hsr_slave_0 left promiscuous mode [ 1775.189527][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1775.201306][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1775.212657][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1775.251170][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1775.358196][T29853] bond0 (unregistering): Released all slaves [ 1775.484437][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1775.515977][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1775.528859][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1775.537795][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1775.547308][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1775.556125][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1775.564586][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1775.572958][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1775.586906][ T1841] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1775.598512][ T1841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1775.609776][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1775.618390][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1775.646586][ T1851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1775.669408][ T1841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1775.677766][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1775.691836][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1775.703431][ T1851] 8021q: adding VLAN 0 to HW filter on device team0 [ 1775.718206][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1775.729978][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1775.738507][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1775.745582][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1775.754639][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1775.763152][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1775.771824][T15083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1775.778922][T15083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1775.787468][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1775.803885][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1775.812590][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1775.822042][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1775.844656][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1775.863400][ T1851] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1775.875709][ T1851] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1775.890568][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1775.899806][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1775.908840][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1775.918870][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1775.927802][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1775.937017][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1775.945752][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1775.954861][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1775.981816][ T1851] 8021q: adding VLAN 0 to HW filter on device batadv0 15:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:37 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x96) 15:58:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) 15:58:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:58:37 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x97) 15:58:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x88d82) write(r1, &(0x7f0000000000), 0xffffff86) 15:58:37 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x98) 15:58:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x0, 0x126, 0x2]}) 15:58:37 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x99) 15:58:37 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9a) 15:58:37 executing program 5: socket$packet(0x11, 0x3, 0x300) getresuid(0x0, &(0x7f0000000080), 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x4008000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)='.\x00', 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x81, r0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x2b4, 0x0) close(r1) 15:58:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:38 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9b) 15:58:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) [ 1778.331592][ T2315] IPVS: ftp: loaded support on port[0] = 21 [ 1778.529294][ T2315] chnl_net:caif_netlink_parms(): no params data found [ 1778.592479][ T2315] bridge0: port 1(bridge_slave_0) entered blocking state [ 1778.603084][ T2315] bridge0: port 1(bridge_slave_0) entered disabled state [ 1778.617314][ T2315] device bridge_slave_0 entered promiscuous mode [ 1778.628829][ T2315] bridge0: port 2(bridge_slave_1) entered blocking state [ 1778.639007][ T2315] bridge0: port 2(bridge_slave_1) entered disabled state [ 1778.649907][ T2315] device bridge_slave_1 entered promiscuous mode [ 1778.701998][ T2315] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1778.720362][ T2315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1778.784921][ T2315] team0: Port device team_slave_0 added [ 1778.834375][ T2315] team0: Port device team_slave_1 added [ 1778.937781][ T2315] device hsr_slave_0 entered promiscuous mode [ 1779.016619][ T2315] device hsr_slave_1 entered promiscuous mode [ 1779.402850][ T2318] IPVS: ftp: loaded support on port[0] = 21 [ 1779.486745][ T2315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1779.524653][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1779.532448][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1779.562790][ T2315] 8021q: adding VLAN 0 to HW filter on device team0 [ 1779.580905][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1779.590394][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1779.601465][T14405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1779.608596][T14405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1779.644438][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1779.654928][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1779.663427][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1779.672345][T14405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1779.689203][T14405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1779.698224][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1779.707038][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1779.742316][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1779.751930][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1779.760621][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1779.769572][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1779.794841][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1779.810279][ T2315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1779.821577][ T2315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1779.838962][ T2318] chnl_net:caif_netlink_parms(): no params data found [ 1779.848411][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1779.857899][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1779.866611][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1779.875515][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1779.883855][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1780.287383][ T2318] bridge0: port 1(bridge_slave_0) entered blocking state [ 1780.296145][ T2318] bridge0: port 1(bridge_slave_0) entered disabled state [ 1780.304764][ T2318] device bridge_slave_0 entered promiscuous mode [ 1780.497624][ T2315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1780.507756][ T2318] bridge0: port 2(bridge_slave_1) entered blocking state [ 1780.518169][ T2318] bridge0: port 2(bridge_slave_1) entered disabled state [ 1780.526914][ T2318] device bridge_slave_1 entered promiscuous mode [ 1780.557017][ T2318] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1780.759125][ T2318] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:58:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1781.176216][ T2318] team0: Port device team_slave_0 added [ 1781.183718][ T2318] team0: Port device team_slave_1 added [ 1781.267304][ T2318] device hsr_slave_0 entered promiscuous mode [ 1781.324213][ T2318] device hsr_slave_1 entered promiscuous mode [ 1781.636612][ T2318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1781.836231][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1781.845273][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1781.856479][ T2318] 8021q: adding VLAN 0 to HW filter on device team0 [ 1782.054169][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1782.062856][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1782.071657][T14405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1782.078746][T14405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1782.087155][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1782.095929][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1782.104654][T14405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1782.111925][T14405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1782.120364][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1782.315745][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1782.325042][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1782.335450][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1782.345274][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1782.353711][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1782.549883][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1782.558918][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1782.567879][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1782.577064][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1782.587903][T29853] device bridge_slave_1 left promiscuous mode [ 1782.595538][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1782.635153][T29853] device bridge_slave_0 left promiscuous mode [ 1782.641545][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1782.695874][T29853] device bridge_slave_1 left promiscuous mode [ 1782.702185][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1782.765197][T29853] device bridge_slave_0 left promiscuous mode [ 1782.771601][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1782.836408][T29853] device bridge_slave_1 left promiscuous mode [ 1782.842605][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1782.904820][T29853] device bridge_slave_0 left promiscuous mode [ 1782.911558][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1787.687120][T29853] device hsr_slave_1 left promiscuous mode [ 1787.740948][T29853] device hsr_slave_0 left promiscuous mode [ 1787.801057][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1787.811644][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1787.823582][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1787.848729][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1787.941430][T29853] bond0 (unregistering): Released all slaves [ 1788.117024][T29853] device hsr_slave_1 left promiscuous mode [ 1788.157309][T29853] device hsr_slave_0 left promiscuous mode [ 1788.209600][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1788.221330][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1788.232677][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1788.259961][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1788.329977][T29853] bond0 (unregistering): Released all slaves [ 1788.516595][T29853] device hsr_slave_1 left promiscuous mode [ 1788.569668][T29853] device hsr_slave_0 left promiscuous mode [ 1788.630430][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1788.641066][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1788.653724][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1788.679295][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1788.771294][T29853] bond0 (unregistering): Released all slaves [ 1788.872358][ T2318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1788.886083][ T2318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1788.894104][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1788.902283][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1788.929835][ T2318] 8021q: adding VLAN 0 to HW filter on device batadv0 15:58:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:58:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:50 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9c) 15:58:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x0, 0x126, 0x2]}) 15:58:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x6, 0x3, 0x0, 0x126, 0x2]}) 15:58:50 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9d) 15:58:50 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9e) 15:58:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:50 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x9f) 15:58:50 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa0) 15:58:50 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa1) 15:58:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:58:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1791.390879][ T2379] IPVS: ftp: loaded support on port[0] = 21 [ 1791.515830][ T2379] chnl_net:caif_netlink_parms(): no params data found [ 1791.565685][ T2379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1791.572804][ T2379] bridge0: port 1(bridge_slave_0) entered disabled state [ 1791.582858][ T2379] device bridge_slave_0 entered promiscuous mode [ 1791.590539][ T2379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1791.597777][ T2379] bridge0: port 2(bridge_slave_1) entered disabled state [ 1791.605617][ T2379] device bridge_slave_1 entered promiscuous mode [ 1791.627200][ T2379] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1791.637737][ T2379] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1791.672728][ T2379] team0: Port device team_slave_0 added [ 1791.680144][ T2379] team0: Port device team_slave_1 added [ 1791.741605][ T2379] device hsr_slave_0 entered promiscuous mode [ 1791.814341][ T2379] device hsr_slave_1 entered promiscuous mode [ 1791.870044][ T2384] IPVS: ftp: loaded support on port[0] = 21 [ 1791.871887][ T2379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1791.883096][ T2379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1791.890512][ T2379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1791.898290][ T2379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1791.936773][ T2386] IPVS: ftp: loaded support on port[0] = 21 [ 1791.952119][ T2385] IPVS: ftp: loaded support on port[0] = 21 [ 1792.232814][ T2379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1792.446949][ T2384] chnl_net:caif_netlink_parms(): no params data found [ 1792.472289][ T2385] chnl_net:caif_netlink_parms(): no params data found [ 1792.499037][ T2386] chnl_net:caif_netlink_parms(): no params data found [ 1792.588233][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1792.597932][T14158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.605699][T14158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1792.614726][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1792.639343][ T2379] 8021q: adding VLAN 0 to HW filter on device team0 [ 1792.754539][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1792.763143][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1792.771824][T20875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.778921][T20875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1792.786678][ T2384] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.794765][ T2384] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.802395][ T2384] device bridge_slave_0 entered promiscuous mode [ 1792.810747][ T2386] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.818297][ T2386] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.826511][ T2386] device bridge_slave_0 entered promiscuous mode [ 1792.834526][ T2385] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.841616][ T2385] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.853169][ T2385] device bridge_slave_0 entered promiscuous mode [ 1792.930341][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1792.939271][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1792.947751][T20875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.954896][T20875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1792.963345][ T2384] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.974979][ T2384] bridge0: port 2(bridge_slave_1) entered disabled state [ 1792.982709][ T2384] device bridge_slave_1 entered promiscuous mode [ 1792.989940][ T2386] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.997413][ T2386] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.006495][ T2386] device bridge_slave_1 entered promiscuous mode [ 1793.013354][ T2385] bridge0: port 2(bridge_slave_1) entered blocking state [ 1793.021076][ T2385] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.029456][ T2385] device bridge_slave_1 entered promiscuous mode [ 1793.135929][ T2385] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1793.151439][ T2385] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1793.183487][ T2384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1793.258817][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1793.268020][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1793.285815][ T2386] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1793.300027][ T2386] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1793.318413][ T2384] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1793.328533][ T2385] team0: Port device team_slave_0 added [ 1793.345126][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1793.353647][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1793.362953][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1793.379202][ T2385] team0: Port device team_slave_1 added [ 1793.435755][ T2385] device hsr_slave_0 entered promiscuous mode [ 1793.484546][ T2385] device hsr_slave_1 entered promiscuous mode [ 1793.526293][ T2386] team0: Port device team_slave_0 added [ 1793.602979][ T2384] team0: Port device team_slave_0 added [ 1793.611442][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1793.619939][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1793.629059][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1793.638018][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1793.653171][ T2386] team0: Port device team_slave_1 added [ 1793.662260][ T2384] team0: Port device team_slave_1 added [ 1793.670229][T29853] device bridge_slave_1 left promiscuous mode [ 1793.676987][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.724913][T29853] device bridge_slave_0 left promiscuous mode [ 1793.731099][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1795.458099][T29853] device hsr_slave_1 left promiscuous mode [ 1795.527137][T29853] device hsr_slave_0 left promiscuous mode [ 1795.567068][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1795.581111][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1795.592558][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1795.651016][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1795.733136][T29853] bond0 (unregistering): Released all slaves [ 1795.835680][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1795.845130][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1795.869502][ T2379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1795.947133][ T2384] device hsr_slave_0 entered promiscuous mode [ 1795.984368][ T2384] device hsr_slave_1 entered promiscuous mode [ 1796.087000][ T2386] device hsr_slave_0 entered promiscuous mode [ 1796.127882][ T2386] device hsr_slave_1 entered promiscuous mode [ 1796.242877][ T2379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1796.359175][ T2385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1796.413448][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1796.422405][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1796.468765][ T2385] 8021q: adding VLAN 0 to HW filter on device team0 [ 1796.524359][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1796.539911][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1796.561819][T20875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1796.568993][T20875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1796.585709][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1796.633414][ T2384] 8021q: adding VLAN 0 to HW filter on device bond0 15:58:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x0, 0x126, 0x2]}) [ 1796.684456][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1796.693241][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1796.732558][T14158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1796.739700][T14158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1796.757852][T14158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1797.045040][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1797.063942][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1797.072861][T20875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1797.092663][ T2384] 8021q: adding VLAN 0 to HW filter on device team0 [ 1797.123064][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1797.131857][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1797.154827][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1797.162704][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1797.185518][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1797.209952][ T2386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1797.229737][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1797.247950][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1797.261962][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1797.269106][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1797.285825][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1797.300639][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1797.310727][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1797.346439][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1797.361215][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1797.372712][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1797.379832][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1797.396222][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1797.409971][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1797.421028][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1797.442877][ T2386] 8021q: adding VLAN 0 to HW filter on device team0 [ 1797.470953][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1797.489290][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1797.502650][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1797.519348][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1797.530801][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1797.550227][ T2385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1797.574291][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1797.582223][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1797.600079][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1797.622584][ T2384] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1797.644257][ T2384] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1797.668368][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1797.677386][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1797.686159][T14525] bridge0: port 1(bridge_slave_0) entered blocking state [ 1797.693215][T14525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1797.702072][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1797.710778][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1797.719228][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1797.727743][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1797.736463][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1797.745455][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1797.753717][T14525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1797.760812][T14525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1797.768900][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1797.777020][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1797.795179][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1797.820688][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1797.845419][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1797.854795][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1797.877023][ T2386] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1797.887448][ T2386] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1797.906152][ T2384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1797.915879][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1797.924651][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1797.933443][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1797.943110][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1797.955037][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1797.963263][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1797.971766][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1797.982386][ T2385] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1798.012137][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1798.031343][ T2386] 8021q: adding VLAN 0 to HW filter on device batadv0 15:58:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:58:59 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa2) 15:58:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x401, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:58:59 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa3) 15:58:59 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa4) 15:58:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:58:59 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa5) 15:59:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa6) 15:59:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa7) 15:59:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:59:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa8) [ 1800.741592][ T2472] IPVS: ftp: loaded support on port[0] = 21 [ 1801.062721][ T2472] chnl_net:caif_netlink_parms(): no params data found [ 1801.094216][ T2472] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.101379][ T2472] bridge0: port 1(bridge_slave_0) entered disabled state [ 1801.109162][ T2472] device bridge_slave_0 entered promiscuous mode [ 1801.358425][ T2472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.365804][ T2472] bridge0: port 2(bridge_slave_1) entered disabled state [ 1801.373396][ T2472] device bridge_slave_1 entered promiscuous mode [ 1801.393278][ T2472] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1801.405052][ T2472] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1801.661888][ T2472] team0: Port device team_slave_0 added [ 1801.669402][ T2472] team0: Port device team_slave_1 added [ 1801.715949][ T2472] device hsr_slave_0 entered promiscuous mode [ 1801.764160][ T2472] device hsr_slave_1 entered promiscuous mode [ 1802.112639][ T2472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1802.374355][ T2472] 8021q: adding VLAN 0 to HW filter on device team0 [ 1802.381272][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1802.389775][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1802.404232][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1802.412849][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1802.422655][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1802.429786][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1802.438462][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1802.447560][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1802.456553][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1802.463604][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1802.471325][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1802.480369][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1802.745842][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1802.755107][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1802.763581][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1802.776173][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1802.784924][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1802.802855][ T2472] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1802.813368][ T2472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1803.070553][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1803.079069][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1803.087528][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1803.096352][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1803.105075][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1803.113745][T20874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1803.401173][ T2472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1803.417645][T29853] device bridge_slave_1 left promiscuous mode [ 1803.424636][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1803.475331][T29853] device bridge_slave_0 left promiscuous mode [ 1803.481562][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1803.535911][T29853] device bridge_slave_1 left promiscuous mode [ 1803.542113][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1803.595178][T29853] device bridge_slave_0 left promiscuous mode [ 1803.601362][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1803.656168][T29853] device bridge_slave_1 left promiscuous mode [ 1803.662342][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1803.715447][T29853] device bridge_slave_0 left promiscuous mode [ 1803.721645][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1803.756079][T29853] device bridge_slave_1 left promiscuous mode [ 1803.762269][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1803.815222][T29853] device bridge_slave_0 left promiscuous mode [ 1803.821473][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1810.387284][T29853] device hsr_slave_1 left promiscuous mode [ 1810.429558][T29853] device hsr_slave_0 left promiscuous mode [ 1810.499164][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1810.510744][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1810.521945][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1810.560539][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1810.670659][T29853] bond0 (unregistering): Released all slaves [ 1810.866163][T29853] device hsr_slave_1 left promiscuous mode [ 1810.919498][T29853] device hsr_slave_0 left promiscuous mode [ 1810.980275][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1810.992570][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1811.006051][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1811.060318][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1811.151502][T29853] bond0 (unregistering): Released all slaves [ 1811.277551][T29853] device hsr_slave_1 left promiscuous mode [ 1811.347214][T29853] device hsr_slave_0 left promiscuous mode [ 1811.407399][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1811.422079][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1811.433409][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1811.471858][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1811.569910][T29853] bond0 (unregistering): Released all slaves [ 1811.736014][T29853] device hsr_slave_1 left promiscuous mode [ 1811.791789][T29853] device hsr_slave_0 left promiscuous mode [ 1811.849633][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1811.861163][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1811.872497][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1811.911405][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1811.990833][T29853] bond0 (unregistering): Released all slaves 15:59:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xa9) 15:59:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x5, [0x0, 0x3, 0x0, 0x126, 0x2]}) 15:59:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:59:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xaa) 15:59:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xab) 15:59:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xac) 15:59:13 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xad) 15:59:14 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xae) 15:59:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1814.169145][ T2527] IPVS: ftp: loaded support on port[0] = 21 [ 1814.316930][ T2527] chnl_net:caif_netlink_parms(): no params data found [ 1814.376254][ T2527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1814.383404][ T2527] bridge0: port 1(bridge_slave_0) entered disabled state [ 1814.397947][ T2527] device bridge_slave_0 entered promiscuous mode [ 1814.409631][ T2527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1814.419188][ T2527] bridge0: port 2(bridge_slave_1) entered disabled state [ 1814.430455][ T2527] device bridge_slave_1 entered promiscuous mode [ 1814.460097][ T2527] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1814.471530][ T2527] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1814.501752][ T2527] team0: Port device team_slave_0 added [ 1814.512653][ T2527] team0: Port device team_slave_1 added [ 1814.578796][ T2527] device hsr_slave_0 entered promiscuous mode [ 1814.646856][ T2527] device hsr_slave_1 entered promiscuous mode [ 1814.699370][ T2534] IPVS: ftp: loaded support on port[0] = 21 [ 1814.702800][ T2535] IPVS: ftp: loaded support on port[0] = 21 [ 1814.715881][ T2527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1814.722965][ T2527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1814.730381][ T2527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1814.737495][ T2527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1814.888572][ T2527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1814.942639][ T2527] 8021q: adding VLAN 0 to HW filter on device team0 [ 1814.977381][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1814.986267][ T8974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1814.994435][ T8974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1815.003162][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1815.105069][ T2535] chnl_net:caif_netlink_parms(): no params data found [ 1815.125419][ T2534] chnl_net:caif_netlink_parms(): no params data found [ 1815.169848][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1815.178635][T14525] bridge0: port 1(bridge_slave_0) entered blocking state [ 1815.185749][T14525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1815.201485][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1815.210568][T14525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1815.217752][T14525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1815.292811][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1815.312659][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1815.322970][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1815.349467][ T2535] bridge0: port 1(bridge_slave_0) entered blocking state [ 1815.359997][ T2535] bridge0: port 1(bridge_slave_0) entered disabled state [ 1815.370616][ T2535] device bridge_slave_0 entered promiscuous mode [ 1815.390249][ T2527] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1815.403583][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1815.412038][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1815.422204][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1815.431187][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1815.448383][ T2535] bridge0: port 2(bridge_slave_1) entered blocking state [ 1815.457059][ T2535] bridge0: port 2(bridge_slave_1) entered disabled state [ 1815.465482][ T2535] device bridge_slave_1 entered promiscuous mode [ 1815.488088][ T2534] bridge0: port 1(bridge_slave_0) entered blocking state [ 1815.495658][ T2534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1815.505267][ T2534] device bridge_slave_0 entered promiscuous mode [ 1815.525751][ T2527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1815.535177][ T2534] bridge0: port 2(bridge_slave_1) entered blocking state [ 1815.542457][ T2534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1815.570455][ T2534] device bridge_slave_1 entered promiscuous mode [ 1815.613561][ T2534] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1815.625908][ T2534] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1815.637595][ T2535] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1815.660317][ T2535] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1815.703400][ T2535] team0: Port device team_slave_0 added [ 1815.723477][ T2535] team0: Port device team_slave_1 added [ 1815.738908][ T2534] team0: Port device team_slave_0 added [ 1815.762700][ T2534] team0: Port device team_slave_1 added [ 1815.817146][ T2535] device hsr_slave_0 entered promiscuous mode [ 1815.854220][ T2535] device hsr_slave_1 entered promiscuous mode 15:59:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x5, [0x0, 0x3, 0x0, 0x126, 0x2]}) 15:59:16 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xaf) [ 1815.987486][ T2534] device hsr_slave_0 entered promiscuous mode [ 1816.025328][ T2534] device hsr_slave_1 entered promiscuous mode [ 1816.486643][ T2534] bridge0: port 2(bridge_slave_1) entered blocking state [ 1816.493750][ T2534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1816.501201][ T2534] bridge0: port 1(bridge_slave_0) entered blocking state [ 1816.508305][ T2534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1816.527394][T14525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1816.536219][T14525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1816.720662][ T2535] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1816.735951][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1816.743750][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1816.758555][ T2535] 8021q: adding VLAN 0 to HW filter on device team0 [ 1816.894513][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1816.903444][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1816.912057][T14525] bridge0: port 1(bridge_slave_0) entered blocking state [ 1816.919170][T14525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1816.927533][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1816.936331][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1816.944818][T14525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1816.951908][T14525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1816.975974][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1816.986911][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1816.996083][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1817.006128][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1817.014577][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1817.022837][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1817.031453][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1817.040553][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1817.172359][ T2535] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1817.183334][ T2535] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1817.204582][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1817.212964][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1817.221522][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1817.231890][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1817.240536][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1817.253277][ T2534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1817.405226][ T2534] 8021q: adding VLAN 0 to HW filter on device team0 [ 1817.412908][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1817.420713][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1817.432080][ T2535] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1817.586041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1817.595066][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1817.603536][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1817.610665][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1817.618421][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1817.630386][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1817.638973][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1817.646086][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1817.653666][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1817.675605][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1817.685864][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1817.695065][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1817.703590][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1817.722661][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1817.735646][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1817.744548][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1817.753122][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1817.765068][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1817.773462][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:59:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1817.989481][ T2534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1818.030711][ T2534] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1818.601397][T29853] device bridge_slave_1 left promiscuous mode [ 1818.614110][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.655259][T29853] device bridge_slave_0 left promiscuous mode [ 1818.661642][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1818.708086][T29853] device bridge_slave_1 left promiscuous mode [ 1818.714544][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.764929][T29853] device bridge_slave_0 left promiscuous mode [ 1818.771203][T29853] bridge0: port 1(bridge_slave_0) entered disabled state 15:59:19 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) unshare(0x8020000) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9, 0x30000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000200)='selfvboxnet0GPL,vmnet1\\mime_type\x00', 0x3) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0xc012, r0, 0x8000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0xfffffffffffffffe, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000003c0)={0x8, @output={0x1000, 0x1, {0x5, 0x1ff}, 0x10000, 0xffffffff80000000}}) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 15:59:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x0, 0x7, 0x126, 0x2]}) 15:59:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb0) 15:59:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x5, [0x0, 0x3, 0x0, 0x126, 0x2]}) 15:59:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:59:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb1) 15:59:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb2) 15:59:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb3) 15:59:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb4) 15:59:20 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb5) [ 1823.117572][T29853] device hsr_slave_1 left promiscuous mode [ 1823.187443][T29853] device hsr_slave_0 left promiscuous mode [ 1823.247417][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1823.260734][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1823.272167][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1823.311253][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1823.402175][T29853] bond0 (unregistering): Released all slaves [ 1823.605989][T29853] device hsr_slave_1 left promiscuous mode [ 1823.667287][T29853] device hsr_slave_0 left promiscuous mode [ 1823.747316][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1823.758953][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1823.772452][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1823.837953][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1823.932379][T29853] bond0 (unregistering): Released all slaves 15:59:25 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) symlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)='./file1\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x1000000000000105) r2 = dup2(r0, r1) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x1000000841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, 0x0) [ 1824.213386][ T2612] IPVS: ftp: loaded support on port[0] = 21 [ 1824.221002][ T2609] IPVS: ftp: loaded support on port[0] = 21 [ 1824.221728][ T2613] IPVS: ftp: loaded support on port[0] = 21 [ 1824.445443][ T2612] chnl_net:caif_netlink_parms(): no params data found [ 1824.546837][ T2612] bridge0: port 1(bridge_slave_0) entered blocking state [ 1824.554647][ T2612] bridge0: port 1(bridge_slave_0) entered disabled state [ 1824.562275][ T2612] device bridge_slave_0 entered promiscuous mode [ 1824.573640][ T2612] bridge0: port 2(bridge_slave_1) entered blocking state [ 1824.580818][ T2612] bridge0: port 2(bridge_slave_1) entered disabled state [ 1824.588614][ T2612] device bridge_slave_1 entered promiscuous mode [ 1824.644171][ T2609] chnl_net:caif_netlink_parms(): no params data found [ 1824.684166][ T2613] chnl_net:caif_netlink_parms(): no params data found [ 1824.695885][ T2612] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1824.722072][ T2612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1824.814273][ T2612] team0: Port device team_slave_0 added [ 1824.822844][ T2612] team0: Port device team_slave_1 added [ 1824.842064][ T2609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1824.849870][ T2609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1824.866292][ T2609] device bridge_slave_0 entered promiscuous mode [ 1824.909374][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 1824.926643][ T2609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1824.940250][ T2609] device bridge_slave_1 entered promiscuous mode [ 1825.036993][ T2612] device hsr_slave_0 entered promiscuous mode [ 1825.074966][ T2612] device hsr_slave_1 entered promiscuous mode [ 1825.130282][ T2613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.144067][ T2613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1825.162503][ T2613] device bridge_slave_0 entered promiscuous mode [ 1825.208929][ T2609] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1825.226134][ T2613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.233219][ T2613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1825.255470][ T2613] device bridge_slave_1 entered promiscuous mode [ 1825.286810][ T2609] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1825.326804][ T2609] team0: Port device team_slave_0 added [ 1825.337230][ T2609] team0: Port device team_slave_1 added [ 1825.390076][ T2613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1825.421994][ T2613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1825.466049][ T2612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1825.536958][ T2609] device hsr_slave_0 entered promiscuous mode [ 1825.574310][ T2609] device hsr_slave_1 entered promiscuous mode [ 1825.635599][ T2613] team0: Port device team_slave_0 added [ 1825.647526][ T2612] 8021q: adding VLAN 0 to HW filter on device team0 [ 1825.656370][ T2613] team0: Port device team_slave_1 added [ 1825.667631][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1825.675791][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1825.747251][ T2613] device hsr_slave_0 entered promiscuous mode [ 1825.794498][ T2613] device hsr_slave_1 entered promiscuous mode [ 1825.868881][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1825.882825][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1825.892677][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.901312][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1825.909514][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1825.918340][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1825.926796][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.933885][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1825.943247][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1825.963889][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1825.972620][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1825.983114][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1825.991695][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1826.000553][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1826.021196][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1826.030554][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1826.051224][ T2612] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1826.061751][ T2612] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1826.074216][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1826.082716][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1826.091759][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1826.100858][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1826.134857][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1826.147108][ T2612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1826.193646][ T2609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1826.228310][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1826.244748][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1826.257191][ T2613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1826.276125][ T2609] 8021q: adding VLAN 0 to HW filter on device team0 [ 1826.298324][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1826.312930][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1826.347058][ T2613] 8021q: adding VLAN 0 to HW filter on device team0 [ 1826.361231][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1826.374792][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1826.383319][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1826.390443][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1826.402535][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1826.412633][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1826.421666][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1826.428802][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1826.439476][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1826.449934][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1826.479294][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1826.529813][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1826.577127][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1826.605293][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1826.625398][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1826.634431][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1826.650051][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1826.658978][ T8974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1826.666130][ T8974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1826.674290][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1826.683073][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1826.692175][ T8974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1826.699311][ T8974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1826.707487][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1826.717154][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1826.725611][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1826.740639][ T2609] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1826.752171][ T2609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1826.778993][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1826.797853][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1826.807224][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1826.815927][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:59:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x0, 0x7, 0x126, 0x2]}) 15:59:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1826.824375][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1826.833046][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1826.852984][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1826.904605][ T2609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1826.927514][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1826.939849][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1826.963430][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1826.989368][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1827.013312][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1827.031338][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1827.055248][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1827.063700][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1827.081967][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1827.292824][ T2613] 8021q: adding VLAN 0 to HW filter on device batadv0 15:59:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x0, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:59:28 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x6000000000000004) 15:59:28 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb6) 15:59:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x0, 0x7, 0x126, 0x2]}) 15:59:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:59:28 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb7) 15:59:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb8) 15:59:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xb9) 15:59:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:29 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xba) 15:59:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x0, 0x0, 0x3, 0x0, 0x126, 0x2]}) [ 1829.801949][ T2687] IPVS: ftp: loaded support on port[0] = 21 [ 1830.172376][ T2689] IPVS: ftp: loaded support on port[0] = 21 [ 1830.817170][ T2689] chnl_net:caif_netlink_parms(): no params data found [ 1830.833084][ T2687] chnl_net:caif_netlink_parms(): no params data found [ 1831.403999][ T2689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1831.411116][ T2689] bridge0: port 1(bridge_slave_0) entered disabled state [ 1831.419350][ T2689] device bridge_slave_0 entered promiscuous mode [ 1831.433183][ T2689] bridge0: port 2(bridge_slave_1) entered blocking state [ 1831.440327][ T2689] bridge0: port 2(bridge_slave_1) entered disabled state [ 1831.448537][ T2689] device bridge_slave_1 entered promiscuous mode [ 1831.467696][ T2687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1831.477000][ T2687] bridge0: port 1(bridge_slave_0) entered disabled state [ 1831.484861][ T2687] device bridge_slave_0 entered promiscuous mode [ 1831.494522][ T2689] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1831.502986][ T2687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1831.510513][ T2687] bridge0: port 2(bridge_slave_1) entered disabled state [ 1831.518965][ T2687] device bridge_slave_1 entered promiscuous mode [ 1831.783409][ T2689] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1831.817741][ T2687] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1832.096178][ T2687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1832.105855][ T2689] team0: Port device team_slave_0 added [ 1832.126994][ T2689] team0: Port device team_slave_1 added [ 1832.134017][ T2687] team0: Port device team_slave_0 added [ 1832.141309][ T2687] team0: Port device team_slave_1 added [ 1832.176571][T29853] device bridge_slave_1 left promiscuous mode [ 1832.182819][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.225108][T29853] device bridge_slave_0 left promiscuous mode [ 1832.231297][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1832.285936][T29853] device bridge_slave_1 left promiscuous mode [ 1832.292177][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.337139][T29853] device bridge_slave_0 left promiscuous mode [ 1832.343340][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1832.396001][T29853] device bridge_slave_1 left promiscuous mode [ 1832.402795][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.444713][T29853] device bridge_slave_0 left promiscuous mode [ 1832.451577][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1832.495978][T29853] device bridge_slave_1 left promiscuous mode [ 1832.502224][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1832.535160][T29853] device bridge_slave_0 left promiscuous mode [ 1832.541406][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1839.636717][T29853] device hsr_slave_1 left promiscuous mode [ 1839.679126][T29853] device hsr_slave_0 left promiscuous mode [ 1839.719647][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1839.731212][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1839.742658][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1839.800977][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1839.893610][T29853] bond0 (unregistering): Released all slaves [ 1840.027458][T29853] device hsr_slave_1 left promiscuous mode [ 1840.069719][T29853] device hsr_slave_0 left promiscuous mode [ 1840.137490][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1840.149452][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1840.164627][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1840.211275][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1840.312282][T29853] bond0 (unregistering): Released all slaves [ 1840.486532][T29853] device hsr_slave_1 left promiscuous mode [ 1840.559597][T29853] device hsr_slave_0 left promiscuous mode [ 1840.601690][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1840.613287][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1840.626281][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1840.668073][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1840.753471][T29853] bond0 (unregistering): Released all slaves [ 1840.897661][T29853] device hsr_slave_1 left promiscuous mode [ 1840.940268][T29853] device hsr_slave_0 left promiscuous mode [ 1841.007384][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1841.020667][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1841.031978][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1841.081411][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1841.180517][T29853] bond0 (unregistering): Released all slaves [ 1841.307076][ T2687] device hsr_slave_0 entered promiscuous mode [ 1841.354325][ T2687] device hsr_slave_1 entered promiscuous mode [ 1841.477112][ T2689] device hsr_slave_0 entered promiscuous mode [ 1841.544144][ T2689] device hsr_slave_1 entered promiscuous mode [ 1841.704767][ T2689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1841.721169][ T2687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1841.736235][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1841.748299][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1841.759122][ T2689] 8021q: adding VLAN 0 to HW filter on device team0 [ 1841.775117][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1841.783670][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1841.792834][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1841.799934][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1841.808797][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1841.817714][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1841.826225][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1841.833273][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1841.841093][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1841.849724][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1841.862389][ T2687] 8021q: adding VLAN 0 to HW filter on device team0 [ 1841.884141][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1841.892017][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1841.902721][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1841.911287][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1841.920126][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1841.928811][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1841.937691][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1841.946249][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1841.954732][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1841.962875][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1841.971566][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1841.980495][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1841.998911][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1842.014133][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1842.022840][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1842.031433][T22483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1842.038550][T22483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1842.052730][T14525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1842.069541][ T2689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1842.080178][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1842.089729][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1842.099178][ T8974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1842.106321][ T8974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1842.129419][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1842.142702][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1842.164463][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1842.179904][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1842.210077][ T2687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1842.221437][ T2687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1842.234538][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1842.245764][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1842.254476][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1842.262778][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1842.271591][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1842.280142][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1842.288593][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1842.297249][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1842.324809][ T2687] 8021q: adding VLAN 0 to HW filter on device batadv0 15:59:44 executing program 5: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 15:59:44 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xbb) 15:59:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:59:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x6, [0x0, 0x0, 0x3, 0x0, 0x126, 0x2]}) 15:59:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:44 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xbc) 15:59:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0acfdd7be070") openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) getresuid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r1 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) syz_genetlink_get_family_id$fou(0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000004c0)={0x6, {{0x2, 0x0, @loopback}}}, 0x88) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000180)={'veth0_to_bridge\x00', 0x10000}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 15:59:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 15:59:44 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xbd) 15:59:45 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xbe) 15:59:45 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xbf) 15:59:45 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc0) 15:59:45 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc1) 15:59:45 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc2) [ 1845.397440][ T2771] IPVS: ftp: loaded support on port[0] = 21 [ 1845.503691][ T2771] chnl_net:caif_netlink_parms(): no params data found [ 1845.572837][ T2771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1845.588309][ T2771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1845.600598][ T2771] device bridge_slave_0 entered promiscuous mode [ 1845.613358][ T2771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1845.627950][ T2771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1845.640820][ T2771] device bridge_slave_1 entered promiscuous mode [ 1845.678846][ T2771] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1845.696931][ T2771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1845.739450][ T2771] team0: Port device team_slave_0 added [ 1845.752320][ T2771] team0: Port device team_slave_1 added [ 1845.827060][ T2771] device hsr_slave_0 entered promiscuous mode [ 1845.865110][ T2771] device hsr_slave_1 entered promiscuous mode [ 1845.999180][ T2771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1846.018564][ T2771] 8021q: adding VLAN 0 to HW filter on device team0 [ 1846.028427][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1846.040830][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1846.073952][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1846.082650][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1846.104597][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1846.111689][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1846.144193][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1846.152929][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1846.170806][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1846.177953][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1846.658924][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1846.673442][ T2777] IPVS: ftp: loaded support on port[0] = 21 [ 1846.673616][ T2776] IPVS: ftp: loaded support on port[0] = 21 [ 1846.952357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1846.961672][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1846.971287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1846.980183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1846.989005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1847.002405][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1847.022770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1847.031236][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1847.039925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1847.048368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1847.065753][ T2771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1847.670935][ T2771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1848.012100][ T2777] chnl_net:caif_netlink_parms(): no params data found [ 1848.030451][ T2776] chnl_net:caif_netlink_parms(): no params data found [ 1848.941072][ T2777] bridge0: port 1(bridge_slave_0) entered blocking state [ 1848.952491][ T2777] bridge0: port 1(bridge_slave_0) entered disabled state [ 1848.960965][ T2777] device bridge_slave_0 entered promiscuous mode [ 1848.970406][ T2776] bridge0: port 1(bridge_slave_0) entered blocking state [ 1848.978379][ T2776] bridge0: port 1(bridge_slave_0) entered disabled state [ 1848.986734][ T2776] device bridge_slave_0 entered promiscuous mode [ 1848.996265][ T2776] bridge0: port 2(bridge_slave_1) entered blocking state [ 1849.003332][ T2776] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.013065][ T2776] device bridge_slave_1 entered promiscuous mode [ 1849.279449][ T2777] bridge0: port 2(bridge_slave_1) entered blocking state [ 1849.286778][ T2777] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.294947][ T2777] device bridge_slave_1 entered promiscuous mode [ 1849.330903][ T2777] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1849.601488][ T2777] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1849.612028][ T2776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1849.622922][ T2776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1849.657661][ T2777] team0: Port device team_slave_0 added [ 1849.665098][ T2776] team0: Port device team_slave_0 added [ 1849.672119][ T2777] team0: Port device team_slave_1 added [ 1849.688199][ T2776] team0: Port device team_slave_1 added [ 1849.696070][T29853] device bridge_slave_1 left promiscuous mode [ 1849.702290][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.764628][T29853] device bridge_slave_0 left promiscuous mode [ 1849.770795][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.805394][T29853] device bridge_slave_1 left promiscuous mode [ 1849.811543][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.868936][T29853] device bridge_slave_0 left promiscuous mode [ 1849.876647][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.945135][T29853] device bridge_slave_1 left promiscuous mode [ 1849.951284][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1850.014917][T29853] device bridge_slave_0 left promiscuous mode [ 1850.021164][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1850.076002][T29853] device bridge_slave_1 left promiscuous mode [ 1850.082166][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1850.125457][T29853] device bridge_slave_0 left promiscuous mode [ 1850.131630][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1857.065829][T29853] device hsr_slave_1 left promiscuous mode [ 1857.107684][T29853] device hsr_slave_0 left promiscuous mode [ 1857.147240][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1857.160677][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1857.171980][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1857.209395][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1857.302366][T29853] bond0 (unregistering): Released all slaves [ 1857.476895][T29853] device hsr_slave_1 left promiscuous mode [ 1857.517233][T29853] device hsr_slave_0 left promiscuous mode [ 1857.569499][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1857.580981][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1857.592206][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1857.630947][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1857.721653][T29853] bond0 (unregistering): Released all slaves [ 1857.847649][T29853] device hsr_slave_1 left promiscuous mode [ 1857.891400][T29853] device hsr_slave_0 left promiscuous mode [ 1857.949024][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1857.960982][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1857.972286][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1858.012373][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1858.083117][T29853] bond0 (unregistering): Released all slaves [ 1858.246017][T29853] device hsr_slave_1 left promiscuous mode [ 1858.301005][T29853] device hsr_slave_0 left promiscuous mode [ 1858.343201][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1858.356057][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1858.367600][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1858.408781][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1858.501740][T29853] bond0 (unregistering): Released all slaves [ 1858.677150][ T2777] device hsr_slave_0 entered promiscuous mode [ 1858.714255][ T2777] device hsr_slave_1 entered promiscuous mode [ 1858.817011][ T2776] device hsr_slave_0 entered promiscuous mode [ 1858.854339][ T2776] device hsr_slave_1 entered promiscuous mode [ 1858.987167][ T2776] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1859.005360][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1859.013056][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1859.023453][ T2776] 8021q: adding VLAN 0 to HW filter on device team0 [ 1859.038606][ T2777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1859.046424][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1859.056053][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1859.064979][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1859.072049][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1859.093573][ T2777] 8021q: adding VLAN 0 to HW filter on device team0 [ 1859.110747][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1859.119594][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1859.128472][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1859.137661][T14520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1859.144791][T14520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1859.152809][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1859.161589][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1859.169321][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1859.177412][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1859.186112][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1859.195149][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1859.203499][T14520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1859.210601][T14520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1859.218610][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1859.227360][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1859.235883][T14520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1859.242926][T14520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1859.253463][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1859.261563][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1859.270327][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1859.280035][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1859.293003][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1859.301728][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1859.329854][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1859.338393][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1859.347390][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1859.356692][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1859.365627][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1859.382934][ T2776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1859.393399][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1859.402012][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1859.411847][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1859.420401][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1859.428669][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1859.437109][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1859.449703][ T2777] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1859.463385][ T2777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1859.474483][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1859.482419][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1859.491281][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1859.519487][ T2776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1859.546411][ T2777] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:00 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:00 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc3) 16:00:00 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0x2, &(0x7f0000000200)}) 16:00:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc4) 16:00:01 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc5) 16:00:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc6) 16:00:01 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:01 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc7) 16:00:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1862.317109][ T2837] IPVS: ftp: loaded support on port[0] = 21 [ 1862.401318][ T2837] chnl_net:caif_netlink_parms(): no params data found [ 1862.444847][ T2837] bridge0: port 1(bridge_slave_0) entered blocking state [ 1862.451986][ T2837] bridge0: port 1(bridge_slave_0) entered disabled state [ 1862.460112][ T2837] device bridge_slave_0 entered promiscuous mode [ 1862.468598][ T2837] bridge0: port 2(bridge_slave_1) entered blocking state [ 1862.476073][ T2837] bridge0: port 2(bridge_slave_1) entered disabled state [ 1862.484289][ T2837] device bridge_slave_1 entered promiscuous mode [ 1862.507104][ T2837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1862.517590][ T2837] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1862.547544][ T2837] team0: Port device team_slave_0 added [ 1862.560144][ T2837] team0: Port device team_slave_1 added [ 1862.636936][ T2837] device hsr_slave_0 entered promiscuous mode [ 1862.690176][ T2837] device hsr_slave_1 entered promiscuous mode [ 1862.858105][ T2837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1862.877750][ T2840] IPVS: ftp: loaded support on port[0] = 21 [ 1862.912235][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1862.923773][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1862.932095][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1862.961422][ T2837] 8021q: adding VLAN 0 to HW filter on device team0 [ 1862.980303][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1862.989963][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1862.998533][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1863.005616][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1863.021570][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1863.029956][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1863.039045][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1863.047541][T15083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1863.054603][T15083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1863.125496][ T2840] chnl_net:caif_netlink_parms(): no params data found [ 1863.139924][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1863.148880][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1863.176518][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1863.185157][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1863.216023][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1863.226087][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1863.235118][ T2840] bridge0: port 1(bridge_slave_0) entered blocking state [ 1863.242188][ T2840] bridge0: port 1(bridge_slave_0) entered disabled state [ 1863.250508][ T2840] device bridge_slave_0 entered promiscuous mode [ 1863.266525][ T2840] bridge0: port 2(bridge_slave_1) entered blocking state [ 1863.273631][ T2840] bridge0: port 2(bridge_slave_1) entered disabled state [ 1863.282335][ T2840] device bridge_slave_1 entered promiscuous mode [ 1863.683353][ T2840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1863.700568][ T2837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1863.711060][ T2840] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1863.920301][ T2840] team0: Port device team_slave_0 added [ 1863.930951][ T2840] team0: Port device team_slave_1 added [ 1863.986932][ T2840] device hsr_slave_0 entered promiscuous mode [ 1864.025742][ T2840] device hsr_slave_1 entered promiscuous mode 16:00:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:05 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc8) 16:00:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1865.300069][ T2840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1865.313580][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1865.322181][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1865.513231][ T2840] 8021q: adding VLAN 0 to HW filter on device team0 [ 1865.527763][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1865.537460][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1865.546189][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1865.553239][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1865.561790][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1865.578547][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1865.587585][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1865.596063][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1865.603128][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1865.611164][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1865.619858][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1865.637721][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1865.646777][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1865.655540][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1865.664443][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1865.672919][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1865.681424][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1865.906344][ T2840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1865.919237][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1865.931482][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1865.943312][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1865.952083][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1866.169599][ T2840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1866.170309][ T2856] IPVS: ftp: loaded support on port[0] = 21 16:00:07 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:07 executing program 4: 16:00:07 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xc9) 16:00:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) [ 1866.459902][T29853] device bridge_slave_1 left promiscuous mode [ 1866.473061][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1866.495225][T29853] device bridge_slave_0 left promiscuous mode [ 1866.501433][T29853] bridge0: port 1(bridge_slave_0) entered disabled state 16:00:07 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xca) [ 1866.566489][T29853] device bridge_slave_1 left promiscuous mode [ 1866.606586][T29853] bridge0: port 2(bridge_slave_1) entered disabled state 16:00:07 executing program 4: 16:00:07 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) sync_file_range(r0, 0x2002, 0x0, 0x2) [ 1866.674332][T29853] device bridge_slave_0 left promiscuous mode [ 1866.681449][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1866.796209][T29853] device bridge_slave_1 left promiscuous mode [ 1866.802433][T29853] bridge0: port 2(bridge_slave_1) entered disabled state 16:00:07 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:07 executing program 4: [ 1866.875309][T29853] device bridge_slave_0 left promiscuous mode [ 1866.881554][T29853] bridge0: port 1(bridge_slave_0) entered disabled state 16:00:07 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xcb) [ 1872.357248][T29853] device hsr_slave_1 left promiscuous mode [ 1872.399747][T29853] device hsr_slave_0 left promiscuous mode [ 1872.467468][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1872.481041][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1872.492349][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1872.530519][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1872.603674][T29853] bond0 (unregistering): Released all slaves [ 1872.776813][T29853] device hsr_slave_1 left promiscuous mode [ 1872.829846][T29853] device hsr_slave_0 left promiscuous mode [ 1872.889222][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1872.900981][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1872.913572][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1872.970808][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1873.050890][T29853] bond0 (unregistering): Released all slaves [ 1873.237659][T29853] device hsr_slave_1 left promiscuous mode [ 1873.279167][T29853] device hsr_slave_0 left promiscuous mode [ 1873.340762][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1873.352372][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1873.365341][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1873.409731][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1873.501145][T29853] bond0 (unregistering): Released all slaves [ 1873.660791][ T2895] IPVS: ftp: loaded support on port[0] = 21 [ 1873.672467][ T2856] chnl_net:caif_netlink_parms(): no params data found [ 1873.698594][ T2897] IPVS: ftp: loaded support on port[0] = 21 [ 1873.730418][ T2856] bridge0: port 1(bridge_slave_0) entered blocking state [ 1873.737890][ T2856] bridge0: port 1(bridge_slave_0) entered disabled state [ 1873.745718][ T2856] device bridge_slave_0 entered promiscuous mode [ 1873.766141][ T2856] bridge0: port 2(bridge_slave_1) entered blocking state [ 1873.773219][ T2856] bridge0: port 2(bridge_slave_1) entered disabled state [ 1873.784769][ T2856] device bridge_slave_1 entered promiscuous mode [ 1873.860508][ T2856] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1873.871961][ T2856] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1873.914260][ T2856] team0: Port device team_slave_0 added [ 1873.921476][ T2856] team0: Port device team_slave_1 added [ 1873.995842][ T2856] device hsr_slave_0 entered promiscuous mode [ 1874.044291][ T2856] device hsr_slave_1 entered promiscuous mode [ 1874.190906][ T2897] chnl_net:caif_netlink_parms(): no params data found [ 1874.212976][ T2856] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.220160][ T2856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1874.227565][ T2856] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.234670][ T2856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1874.258887][ T2895] chnl_net:caif_netlink_parms(): no params data found [ 1874.323190][ T2897] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.331564][ T2897] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.339619][ T2897] device bridge_slave_0 entered promiscuous mode [ 1874.353465][ T2897] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.361086][ T2897] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.369065][ T2897] device bridge_slave_1 entered promiscuous mode [ 1874.391797][ T2895] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.400640][ T2895] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.408702][ T2895] device bridge_slave_0 entered promiscuous mode [ 1874.441885][ T2897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1874.451377][ T2895] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.458910][ T2895] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.467412][ T2895] device bridge_slave_1 entered promiscuous mode [ 1874.489325][ T2897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.509398][ T2895] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1874.520137][ T2895] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.550773][ T2897] team0: Port device team_slave_0 added [ 1874.561117][ T2897] team0: Port device team_slave_1 added [ 1874.573592][ T2895] team0: Port device team_slave_0 added [ 1874.583411][ T2856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1874.635793][ T2895] team0: Port device team_slave_1 added [ 1874.734670][T24165] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.757057][T24165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.767154][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1874.817015][ T2897] device hsr_slave_0 entered promiscuous mode [ 1874.854421][ T2897] device hsr_slave_1 entered promiscuous mode [ 1874.932444][ T2856] 8021q: adding VLAN 0 to HW filter on device team0 [ 1874.948608][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1874.960935][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1875.017895][ T2895] device hsr_slave_0 entered promiscuous mode [ 1875.074618][ T2895] device hsr_slave_1 entered promiscuous mode [ 1875.133393][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1875.142488][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1875.158913][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1875.166064][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1875.181369][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1875.190284][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1875.206196][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1875.213262][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1875.265590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1875.277237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1875.287099][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1875.304542][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1875.313058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1875.333416][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1875.361467][ T2856] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1875.380440][ T2856] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1875.404722][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1875.412600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1875.429517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1875.440796][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1875.456954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1875.511951][ T2856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1875.532407][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1875.577538][ T2897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1875.632020][ T2895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1875.645855][ T2897] 8021q: adding VLAN 0 to HW filter on device team0 [ 1875.652883][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1875.675009][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1875.733347][ T2895] 8021q: adding VLAN 0 to HW filter on device team0 [ 1875.755274][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1875.771955][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1875.793382][T22483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1875.800536][T22483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1875.808910][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1875.816970][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1875.825108][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1875.834295][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1875.842758][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1875.849872][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1875.874530][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1875.903093][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1875.917899][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1875.943525][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1875.960324][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1875.967550][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1875.992043][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1876.029300][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1876.038344][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 16:00:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x0, 0x3, 0x7, 0x126, 0x2]}) 16:00:17 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:17 executing program 4: [ 1876.075429][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1876.098150][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1876.135382][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1876.162165][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1876.189596][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1876.223712][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1876.239212][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1876.248780][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1876.255917][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1876.270248][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1876.293035][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1876.301136][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1876.317692][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1876.327088][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1876.340618][ T2897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1876.366570][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1876.678671][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1876.687244][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1876.695486][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1876.703661][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1876.712335][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1876.735590][ T2897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1876.746517][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1876.781243][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1876.835261][ T2895] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1876.853641][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1876.863040][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1876.892766][ T2895] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:18 executing program 4: 16:00:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:18 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xcc) 16:00:18 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x0, 0x3, 0x7, 0x126, 0x2]}) 16:00:18 executing program 4: 16:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080), 0xe) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0x7, &(0x7f0000000340), 0x0) 16:00:18 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:18 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xcd) 16:00:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:18 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xce) 16:00:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:19 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:19 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xcf) 16:00:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:19 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) [ 1879.195821][ T2975] IPVS: ftp: loaded support on port[0] = 21 [ 1879.518519][ T2975] chnl_net:caif_netlink_parms(): no params data found [ 1879.548352][ T2975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1879.557094][ T2975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1879.565460][ T2975] device bridge_slave_0 entered promiscuous mode [ 1879.697312][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1879.704766][ T2975] bridge0: port 2(bridge_slave_1) entered disabled state [ 1879.712837][ T2975] device bridge_slave_1 entered promiscuous mode [ 1879.738199][ T2975] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1879.749440][ T2975] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1879.893384][ T2975] team0: Port device team_slave_0 added [ 1879.900857][ T2975] team0: Port device team_slave_1 added [ 1880.087035][ T2975] device hsr_slave_0 entered promiscuous mode [ 1880.125032][ T2975] device hsr_slave_1 entered promiscuous mode [ 1880.166033][T29853] device bridge_slave_1 left promiscuous mode [ 1880.172277][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.214968][T29853] device bridge_slave_0 left promiscuous mode [ 1880.221133][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.265184][T29853] device bridge_slave_1 left promiscuous mode [ 1880.271377][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.344657][T29853] device bridge_slave_0 left promiscuous mode [ 1880.350812][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1883.727110][T29853] device hsr_slave_1 left promiscuous mode [ 1883.769776][T29853] device hsr_slave_0 left promiscuous mode [ 1883.847118][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1883.859606][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1883.872659][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1883.911376][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1883.981485][T29853] bond0 (unregistering): Released all slaves [ 1884.167557][T29853] device hsr_slave_1 left promiscuous mode [ 1884.210013][T29853] device hsr_slave_0 left promiscuous mode [ 1884.277954][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1884.289656][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1884.302733][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1884.361402][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1884.452287][T29853] bond0 (unregistering): Released all slaves [ 1884.590099][ T2975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1884.602259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1884.612214][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1884.625412][ T2975] 8021q: adding VLAN 0 to HW filter on device team0 [ 1884.637877][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1884.646790][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1884.656039][T22483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1884.663090][T22483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1884.672307][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1884.691633][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1884.700851][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1884.710255][T15083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1884.717362][T15083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1884.725769][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1884.735148][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1884.754217][ T2975] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1884.764629][ T2975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1884.778013][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1884.787309][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1884.796834][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1884.806337][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1884.815235][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1884.823522][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1884.832096][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1884.841219][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1884.849926][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1884.857887][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1884.882961][ T2975] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x0, 0x3, 0x7, 0x126, 0x2]}) 16:00:26 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd0) 16:00:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:26 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:26 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd1) 16:00:26 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:26 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd2) 16:00:26 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:27 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd3) [ 1887.056436][ T3023] IPVS: ftp: loaded support on port[0] = 21 [ 1887.171874][ T3023] chnl_net:caif_netlink_parms(): no params data found [ 1887.213749][ T3023] bridge0: port 1(bridge_slave_0) entered blocking state [ 1887.222712][ T3023] bridge0: port 1(bridge_slave_0) entered disabled state [ 1887.231128][ T3023] device bridge_slave_0 entered promiscuous mode [ 1887.242254][ T3023] bridge0: port 2(bridge_slave_1) entered blocking state [ 1887.249816][ T3023] bridge0: port 2(bridge_slave_1) entered disabled state [ 1887.258151][ T3023] device bridge_slave_1 entered promiscuous mode [ 1887.301626][ T3023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1887.311610][ T3023] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1887.329286][ T3023] team0: Port device team_slave_0 added [ 1887.342824][ T3023] team0: Port device team_slave_1 added [ 1887.417177][ T3023] device hsr_slave_0 entered promiscuous mode [ 1887.464295][ T3023] device hsr_slave_1 entered promiscuous mode [ 1887.512835][ T3023] bridge0: port 2(bridge_slave_1) entered blocking state [ 1887.519929][ T3023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1887.527308][ T3023] bridge0: port 1(bridge_slave_0) entered blocking state [ 1887.534418][ T3023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1887.609732][ T3023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1887.632313][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1887.634569][ T3026] IPVS: ftp: loaded support on port[0] = 21 [ 1887.647393][T22483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1887.655713][T22483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1887.664184][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1887.676999][ T3023] 8021q: adding VLAN 0 to HW filter on device team0 [ 1888.055854][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1888.064412][T24165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1888.071501][T24165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1888.082147][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1888.090495][T24165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1888.097592][T24165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1888.344722][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1888.353361][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1888.376348][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1888.384678][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1888.393070][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1888.401724][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1888.410264][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1888.603495][ T3023] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1888.615190][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1888.631197][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1888.639906][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1888.672116][ T3026] chnl_net:caif_netlink_parms(): no params data found [ 1888.897278][ T3026] bridge0: port 1(bridge_slave_0) entered blocking state [ 1888.905862][ T3026] bridge0: port 1(bridge_slave_0) entered disabled state [ 1888.913496][ T3026] device bridge_slave_0 entered promiscuous mode [ 1888.926569][ T3023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1888.933746][ T3026] bridge0: port 2(bridge_slave_1) entered blocking state [ 1888.941314][ T3026] bridge0: port 2(bridge_slave_1) entered disabled state [ 1888.953430][ T3026] device bridge_slave_1 entered promiscuous mode [ 1889.165587][ T3026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1889.176199][ T3026] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1889.387216][ T3026] team0: Port device team_slave_0 added [ 1889.397271][ T3026] team0: Port device team_slave_1 added [ 1889.475767][ T3026] device hsr_slave_0 entered promiscuous mode [ 1889.505797][ T3026] device hsr_slave_1 entered promiscuous mode [ 1890.419368][ T3026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1890.433561][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1890.442392][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1890.455230][ T3026] 8021q: adding VLAN 0 to HW filter on device team0 [ 1890.473412][T29853] device bridge_slave_1 left promiscuous mode [ 1890.479842][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1890.505690][T29853] device bridge_slave_0 left promiscuous mode [ 1890.511833][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1890.555187][T29853] device bridge_slave_1 left promiscuous mode [ 1890.561352][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1890.614751][T29853] device bridge_slave_0 left promiscuous mode [ 1890.620907][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1890.677003][T29853] device bridge_slave_1 left promiscuous mode [ 1890.683202][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1890.715186][T29853] device bridge_slave_0 left promiscuous mode [ 1890.721341][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1895.727053][T29853] device hsr_slave_1 left promiscuous mode [ 1895.769160][T29853] device hsr_slave_0 left promiscuous mode [ 1895.829163][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1895.841261][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1895.855856][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1895.880942][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1895.982940][T29853] bond0 (unregistering): Released all slaves [ 1896.166132][T29853] device hsr_slave_1 left promiscuous mode [ 1896.219817][T29853] device hsr_slave_0 left promiscuous mode [ 1896.259685][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1896.271177][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1896.282495][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1896.341077][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1896.430279][T29853] bond0 (unregistering): Released all slaves [ 1896.597617][T29853] device hsr_slave_1 left promiscuous mode [ 1896.639465][T29853] device hsr_slave_0 left promiscuous mode [ 1896.698174][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1896.711490][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1896.722946][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1896.770060][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1896.862537][T29853] bond0 (unregistering): Released all slaves [ 1896.958487][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1896.967369][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1896.975764][T22483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1896.982793][T22483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1896.990565][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1896.999537][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1897.008123][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1897.015221][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1897.022690][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1897.031531][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1897.055429][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1897.065302][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1897.073746][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1897.083557][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1897.092261][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1897.100675][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1897.108872][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1897.117888][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1897.130194][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1897.139376][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1897.150292][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1897.179004][ T3026] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:38 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2008) fallocate(0xffffffffffffffff, 0x0, 0x5e00, 0x2cbd) sync_file_range(0xffffffffffffffff, 0x2002, 0x0, 0x2) 16:00:38 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd4) 16:00:38 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:38 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2008) fallocate(0xffffffffffffffff, 0x0, 0x5e00, 0x2cbd) sync_file_range(0xffffffffffffffff, 0x2002, 0x0, 0x2) 16:00:38 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:38 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd5) 16:00:38 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2008) fallocate(0xffffffffffffffff, 0x0, 0x5e00, 0x2cbd) sync_file_range(0xffffffffffffffff, 0x2002, 0x0, 0x2) 16:00:38 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:38 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd6) 16:00:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:39 executing program 5: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:39 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd7) [ 1899.369060][ T3095] IPVS: ftp: loaded support on port[0] = 21 [ 1899.478213][ T3095] chnl_net:caif_netlink_parms(): no params data found [ 1899.522937][ T3095] bridge0: port 1(bridge_slave_0) entered blocking state [ 1899.531154][ T3095] bridge0: port 1(bridge_slave_0) entered disabled state [ 1899.539367][ T3095] device bridge_slave_0 entered promiscuous mode [ 1899.547953][ T3095] bridge0: port 2(bridge_slave_1) entered blocking state [ 1899.555346][ T3095] bridge0: port 2(bridge_slave_1) entered disabled state [ 1899.563448][ T3095] device bridge_slave_1 entered promiscuous mode [ 1899.589849][ T3095] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1899.601290][ T3095] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1899.633489][ T3095] team0: Port device team_slave_0 added [ 1899.651773][ T3095] team0: Port device team_slave_1 added [ 1899.716969][ T3095] device hsr_slave_0 entered promiscuous mode [ 1899.754197][ T3095] device hsr_slave_1 entered promiscuous mode [ 1899.804019][ T3095] bridge0: port 2(bridge_slave_1) entered blocking state [ 1899.811078][ T3095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1899.818494][ T3095] bridge0: port 1(bridge_slave_0) entered blocking state [ 1899.825586][ T3095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1899.871750][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1899.886810][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1899.895651][T15083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1899.905316][T15083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1899.914579][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1899.929347][ T3095] 8021q: adding VLAN 0 to HW filter on device team0 [ 1899.941775][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1899.951043][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1899.958154][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1899.993320][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1900.002799][T12018] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.009916][T12018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1900.047892][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1900.059144][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1900.068412][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1900.082008][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1900.095792][ T3095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1900.096725][ T3099] IPVS: ftp: loaded support on port[0] = 21 [ 1900.108352][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1900.120884][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1900.175733][ T3095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1900.699139][ T3099] chnl_net:caif_netlink_parms(): no params data found [ 1900.919544][ T3099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.927295][ T3099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1900.935527][ T3099] device bridge_slave_0 entered promiscuous mode [ 1901.061833][ T3099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1901.069162][ T3099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1901.077138][ T3099] device bridge_slave_1 entered promiscuous mode [ 1901.099021][ T3099] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1901.227258][ T3099] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1901.249440][ T3099] team0: Port device team_slave_0 added [ 1901.257968][ T3099] team0: Port device team_slave_1 added [ 1901.426848][ T3099] device hsr_slave_0 entered promiscuous mode [ 1901.454080][ T3099] device hsr_slave_1 entered promiscuous mode [ 1901.682319][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1901.826681][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1901.834425][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1901.845007][ T3099] 8021q: adding VLAN 0 to HW filter on device team0 [ 1901.854718][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1901.863324][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1901.871680][T15083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1901.878815][T15083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1901.886891][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1902.090682][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1902.101205][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1902.111018][T22483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1902.118095][T22483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1902.133861][T15083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1902.145110][T22483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1902.161523][T29853] device bridge_slave_1 left promiscuous mode [ 1902.168852][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1902.205016][T29853] device bridge_slave_0 left promiscuous mode [ 1902.211212][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1902.275470][T29853] device bridge_slave_1 left promiscuous mode [ 1902.281633][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1902.325138][T29853] device bridge_slave_0 left promiscuous mode [ 1902.331327][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1905.597429][T29853] device hsr_slave_1 left promiscuous mode [ 1905.637529][T29853] device hsr_slave_0 left promiscuous mode [ 1905.687316][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1905.698783][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1905.711671][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1905.778057][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1905.851018][T29853] bond0 (unregistering): Released all slaves [ 1906.007412][T29853] device hsr_slave_1 left promiscuous mode [ 1906.050122][T29853] device hsr_slave_0 left promiscuous mode [ 1906.110012][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1906.123769][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1906.135788][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1906.167836][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1906.260402][T29853] bond0 (unregistering): Released all slaves [ 1906.379515][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1906.388518][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1906.396918][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1906.405592][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1906.421119][ T3099] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1906.431777][ T3099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1906.449625][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1906.457844][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1906.466750][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1906.475847][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1906.484573][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1906.493208][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1906.512733][ T3099] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x6, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:47 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd8) 16:00:47 executing program 5: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:47 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xd9) 16:00:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:47 executing program 5: r0 = creat(0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:48 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xda) 16:00:48 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x0, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:48 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:48 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xdb) 16:00:48 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) [ 1908.849147][ T3186] IPVS: ftp: loaded support on port[0] = 21 [ 1908.920142][ T3186] chnl_net:caif_netlink_parms(): no params data found [ 1908.953085][ T3186] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.960374][ T3186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1908.968388][ T3186] device bridge_slave_0 entered promiscuous mode [ 1908.976774][ T3186] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.983960][ T3186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1908.991934][ T3186] device bridge_slave_1 entered promiscuous mode [ 1909.016462][ T3186] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1909.027109][ T3186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1909.054569][ T3186] team0: Port device team_slave_0 added [ 1909.061672][ T3186] team0: Port device team_slave_1 added [ 1909.105755][ T3186] device hsr_slave_0 entered promiscuous mode [ 1909.184171][ T3186] device hsr_slave_1 entered promiscuous mode [ 1909.360490][ T3186] bridge0: port 2(bridge_slave_1) entered blocking state [ 1909.367578][ T3186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1909.374982][ T3186] bridge0: port 1(bridge_slave_0) entered blocking state [ 1909.382028][ T3186] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1909.475620][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1909.487218][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1909.495670][T14159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1909.503165][T14159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1909.512769][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1909.585055][ T3186] 8021q: adding VLAN 0 to HW filter on device team0 [ 1909.595308][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1909.603634][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1909.610777][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1909.621764][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1909.630782][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1909.637889][T14159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1909.745677][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1909.763585][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1909.775590][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1909.852120][ T3186] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1909.862992][ T3186] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1909.875930][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1909.884835][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1909.893529][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1909.974887][ T3186] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:51 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xdc) 16:00:51 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x0, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:51 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:51 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xdd) 16:00:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:51 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:51 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xde) 16:00:51 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:51 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) [ 1910.902668][T29853] device bridge_slave_1 left promiscuous mode [ 1910.944064][T29853] bridge0: port 2(bridge_slave_1) entered disabled state 16:00:52 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xdf) 16:00:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1911.016247][T29853] device bridge_slave_0 left promiscuous mode [ 1911.044097][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.116613][T29853] device hsr_slave_1 left promiscuous mode [ 1913.168824][T29853] device hsr_slave_0 left promiscuous mode [ 1913.228648][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1913.241477][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1913.252946][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1913.298872][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1913.391812][T29853] bond0 (unregistering): Released all slaves [ 1913.511117][ T3284] IPVS: ftp: loaded support on port[0] = 21 [ 1913.593558][ T3284] chnl_net:caif_netlink_parms(): no params data found [ 1913.628477][ T3284] bridge0: port 1(bridge_slave_0) entered blocking state [ 1913.635762][ T3284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.643989][ T3284] device bridge_slave_0 entered promiscuous mode [ 1913.652111][ T3284] bridge0: port 2(bridge_slave_1) entered blocking state [ 1913.659734][ T3284] bridge0: port 2(bridge_slave_1) entered disabled state [ 1913.667605][ T3284] device bridge_slave_1 entered promiscuous mode [ 1913.689468][ T3284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1913.700801][ T3284] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1913.720295][ T3284] team0: Port device team_slave_0 added [ 1913.727065][ T3284] team0: Port device team_slave_1 added [ 1913.797087][ T3284] device hsr_slave_0 entered promiscuous mode [ 1913.874504][ T3284] device hsr_slave_1 entered promiscuous mode [ 1913.986799][ T3284] bridge0: port 2(bridge_slave_1) entered blocking state [ 1913.993918][ T3284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1914.001198][ T3284] bridge0: port 1(bridge_slave_0) entered blocking state [ 1914.008299][ T3284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1914.048327][ T3284] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1914.064531][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1914.073089][T14159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1914.082198][T14159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1914.097909][ T3284] 8021q: adding VLAN 0 to HW filter on device team0 [ 1914.110281][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1914.121861][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 1914.128996][T14159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1914.157034][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1914.166686][T12018] bridge0: port 2(bridge_slave_1) entered blocking state [ 1914.173753][T12018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1914.182764][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1914.195989][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1914.220246][ T3284] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1914.237196][ T3284] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1914.253728][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1914.268601][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1914.282184][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1914.310503][T14159] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1914.323102][ T3284] 8021q: adding VLAN 0 to HW filter on device batadv0 16:00:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x0, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:55 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:55 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:55 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe0) 16:00:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:55 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:55 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe1) 16:00:55 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:55 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:56 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe2) 16:00:56 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:56 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:56 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:56 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe3) 16:00:56 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2008) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000440)={0x7, [0x401, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 16:00:56 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe4) 16:00:57 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:57 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:57 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe5) 16:00:57 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) sysinfo(&(0x7f0000000d80)=""/4096) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000440)={0x8, [0x401, 0x6, 0x3, 0x3, 0x3, 0x7, 0x126, 0x2]}) 16:00:57 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0xe6) 16:00:57 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x5e00, 0x2cbd) sync_file_range(r0, 0x2002, 0x0, 0x2) 16:00:57 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000269, 0x21) 16:00:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, "af293328e78534d339d1a68736d42d78acd9b5e70558d0c27a5a9a9cfa0cb46b13562f4ff02ac01914988e26e90d0c66f397794c566f1e007439a0a72f199137", "dc28a1f034b283ee7a38d78c871b3c549e41138e9a2ba52f5596e82cf251c987083b653adfa6d31501b6e8c0a748991cd3a75df846a85fc12fa69b36c45f0497", "716cbbc3230fcaa912019d39cbac09bd6182aa1fa5c0b0e75a7ecd3516adb11e"}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1918.088025][ T3418] IPVS: ftp: loaded support on port[0] = 21 [ 1918.271386][ T3418] chnl_net:caif_netlink_parms(): no params data found [ 1918.421594][ T3418] bridge0: port 1(bridge_slave_0) entered blocking state [ 1918.428914][ T3418] bridge0: port 1(bridge_slave_0) entered disabled state [ 1918.437130][ T3418] device bridge_slave_0 entered promiscuous mode [ 1918.562128][ T3418] bridge0: port 2(bridge_slave_1) entered blocking state [ 1918.569363][ T3418] bridge0: port 2(bridge_slave_1) entered disabled state [ 1918.577655][ T3418] device bridge_slave_1 entered promiscuous mode [ 1918.719296][ T3418] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1918.729389][ T3418] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1918.863001][ T3418] team0: Port device team_slave_0 added [ 1918.870583][ T3418] team0: Port device team_slave_1 added [ 1918.937908][ T3418] device hsr_slave_0 entered promiscuous mode [ 1918.984188][ T3418] device hsr_slave_1 entered promiscuous mode [ 1919.146570][ T3418] bridge0: port 2(bridge_slave_1) entered blocking state [ 1919.153653][ T3418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1919.161274][ T3418] bridge0: port 1(bridge_slave_0) entered blocking state [ 1919.168364][ T3418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1919.178798][ T3486] bridge0: port 1(bridge_slave_0) entered disabled state [ 1919.186602][ T3486] bridge0: port 2(bridge_slave_1) entered disabled state [ 1919.200405][T29853] device bridge_slave_1 left promiscuous mode [ 1919.207473][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1919.255132][T29853] device bridge_slave_0 left promiscuous mode [ 1919.261365][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1919.306467][T29853] device bridge_slave_1 left promiscuous mode [ 1919.312621][T29853] bridge0: port 2(bridge_slave_1) entered disabled state [ 1919.355160][T29853] device bridge_slave_0 left promiscuous mode [ 1919.361375][T29853] bridge0: port 1(bridge_slave_0) entered disabled state [ 1922.587071][T29853] device hsr_slave_1 left promiscuous mode [ 1922.630631][T29853] device hsr_slave_0 left promiscuous mode [ 1922.690104][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1922.701614][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1922.713588][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1922.750933][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1922.842971][T29853] bond0 (unregistering): Released all slaves [ 1923.025957][T29853] device hsr_slave_1 left promiscuous mode [ 1923.099823][T29853] device hsr_slave_0 left promiscuous mode [ 1923.167488][T29853] team0 (unregistering): Port device team_slave_1 removed [ 1923.181663][T29853] team0 (unregistering): Port device team_slave_0 removed [ 1923.193215][T29853] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1923.238402][T29853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1923.321814][T29853] bond0 (unregistering): Released all slaves [ 1923.452279][ T3418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1923.465222][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1923.481229][T24165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1923.491258][ T3418] 8021q: adding VLAN 0 to HW filter on device team0 [ 1923.507946][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1923.518479][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1923.526945][T25208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1923.534031][T25208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1923.555519][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1923.564454][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1923.572737][T25208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1923.579836][T25208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1923.588717][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1923.598199][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1923.607002][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1923.615456][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1923.623687][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1923.632249][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1923.647178][ T3418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1923.661204][ T3418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1923.673707][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1923.682467][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1923.691008][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1923.700974][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1923.709460][T14520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1923.730198][ T3418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1923.739540][T25208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1923.755571][T29853] ------------[ cut here ]------------ [ 1923.762716][T29853] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 1923.773760][T29853] WARNING: CPU: 0 PID: 29853 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 1923.783289][T29853] Kernel panic - not syncing: panic_on_warn set ... [ 1923.789869][T29853] CPU: 0 PID: 29853 Comm: kworker/u4:6 Not tainted 5.2.0-rc4+ #27 [ 1923.797661][T29853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1923.807721][T29853] Workqueue: netns cleanup_net [ 1923.812470][T29853] Call Trace: [ 1923.815763][T29853] dump_stack+0x172/0x1f0 [ 1923.820093][T29853] ? debug_print_object+0x70/0x250 [ 1923.825202][T29853] panic+0x2cb/0x744 [ 1923.829091][T29853] ? __warn_printk+0xf3/0xf3 [ 1923.833679][T29853] ? debug_print_object+0x168/0x250 [ 1923.838873][T29853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.845111][T29853] ? __warn.cold+0x5/0x4d [ 1923.849439][T29853] ? __warn+0xe8/0x1d0 [ 1923.854233][T29853] ? debug_print_object+0x168/0x250 [ 1923.859441][T29853] __warn.cold+0x20/0x4d [ 1923.863681][T29853] ? debug_print_object+0x168/0x250 [ 1923.868875][T29853] report_bug+0x263/0x2b0 [ 1923.873210][T29853] do_error_trap+0x11b/0x200 [ 1923.877799][T29853] do_invalid_op+0x37/0x50 [ 1923.882213][T29853] ? debug_print_object+0x168/0x250 [ 1923.887409][T29853] invalid_op+0x14/0x20 [ 1923.891570][T29853] RIP: 0010:debug_print_object+0x168/0x250 [ 1923.898276][T29853] Code: dd e0 c9 a4 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd e0 c9 a4 87 48 c7 c7 80 bf a4 87 e8 16 83 0d fe <0f> 0b 83 05 4b 55 4b 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1923.917875][T29853] RSP: 0018:ffff88808b7a7838 EFLAGS: 00010086 [ 1923.923936][T29853] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1923.931901][T29853] RDX: 0000000000000000 RSI: ffffffff815ac956 RDI: ffffed10116f4ef9 [ 1923.939865][T29853] RBP: ffff88808b7a7878 R08: ffff88805a35e500 R09: ffffed1015d040f1 [ 1923.947832][T29853] R10: ffffed1015d040f0 R11: ffff8880ae820787 R12: 0000000000000001 [ 1923.955794][T29853] R13: ffffffff88bad1a0 R14: ffffffff816039d0 R15: ffff888059dbefa0 [ 1923.963776][T29853] ? calc_wheel_index+0x220/0x220 [ 1923.968803][T29853] ? vprintk_func+0x86/0x189 [ 1923.973395][T29853] ? debug_print_object+0x168/0x250 [ 1923.978590][T29853] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1923.984393][T29853] debug_check_no_obj_freed+0x29f/0x464 [ 1923.989946][T29853] kfree+0xbd/0x220 [ 1923.993751][T29853] kvfree+0x61/0x70 [ 1923.997555][T29853] netdev_freemem+0x4c/0x60 [ 1924.002061][T29853] netdev_release+0x86/0xb0 [ 1924.006558][T29853] ? xps_cpus_store+0x2b0/0x2b0 [ 1924.011404][T29853] device_release+0x7a/0x210 [ 1924.015991][T29853] kobject_put.cold+0x289/0x2e6 [ 1924.020836][T29853] netdev_run_todo+0x53b/0x7c0 [ 1924.025592][T29853] ? register_netdev+0x50/0x50 [ 1924.030347][T29853] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 1924.036234][T29853] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1924.042468][T29853] ? net_set_todo+0xbf/0x150 [ 1924.047053][T29853] rtnl_unlock+0xe/0x10 [ 1924.051202][T29853] default_device_exit_batch+0x358/0x410 [ 1924.056826][T29853] ? unregister_netdevice_many+0x50/0x50 [ 1924.062462][T29853] ? default_device_exit+0x203/0x290 [ 1924.067740][T29853] ? do_wait_intr_irq+0x2b0/0x2b0 [ 1924.072759][T29853] ? rtnl_unlock+0xe/0x10 [ 1924.077088][T29853] ? unregister_netdevice_many+0x50/0x50 [ 1924.082726][T29853] ? dev_change_net_namespace+0xc70/0xc70 [ 1924.088445][T29853] ops_exit_list.isra.0+0xfc/0x150 [ 1924.093557][T29853] cleanup_net+0x3fb/0x960 [ 1924.097974][T29853] ? netns_install+0x1d0/0x1d0 [ 1924.102742][T29853] process_one_work+0x989/0x1790 [ 1924.107676][T29853] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1924.113037][T29853] ? lock_acquire+0x16f/0x3f0 [ 1924.117716][T29853] worker_thread+0x98/0xe40 [ 1924.122217][T29853] ? trace_hardirqs_on+0x67/0x220 [ 1924.127242][T29853] kthread+0x354/0x420 [ 1924.131303][T29853] ? process_one_work+0x1790/0x1790 [ 1924.136492][T29853] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1924.142728][T29853] ret_from_fork+0x24/0x30 [ 1924.147142][T29853] [ 1924.147148][T29853] ====================================================== [ 1924.147154][T29853] WARNING: possible circular locking dependency detected [ 1924.147157][T29853] 5.2.0-rc4+ #27 Not tainted [ 1924.147163][T29853] ------------------------------------------------------ [ 1924.147168][T29853] kworker/u4:6/29853 is trying to acquire lock: [ 1924.147172][T29853] 00000000365b3a02 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 1924.147186][T29853] [ 1924.147190][T29853] but task is already holding lock: [ 1924.147194][T29853] 000000000f831a18 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1924.147209][T29853] [ 1924.147214][T29853] which lock already depends on the new lock. [ 1924.147216][T29853] [ 1924.147219][T29853] [ 1924.147224][T29853] the existing dependency chain (in reverse order) is: [ 1924.147227][T29853] [ 1924.147229][T29853] -> #3 (&obj_hash[i].lock){-.-.}: [ 1924.147244][T29853] _raw_spin_lock_irqsave+0x95/0xcd [ 1924.147248][T29853] __debug_object_init+0xc6/0xc30 [ 1924.147252][T29853] debug_object_init+0x16/0x20 [ 1924.147256][T29853] hrtimer_init+0x2a/0x300 [ 1924.147260][T29853] init_dl_task_timer+0x1b/0x50 [ 1924.147265][T29853] __sched_fork+0x22a/0x4f0 [ 1924.147268][T29853] init_idle+0x75/0x670 [ 1924.147272][T29853] sched_init+0x952/0x9f5 [ 1924.147276][T29853] start_kernel+0x393/0x893 [ 1924.147281][T29853] x86_64_start_reservations+0x29/0x2b [ 1924.147285][T29853] x86_64_start_kernel+0x77/0x7b [ 1924.147289][T29853] secondary_startup_64+0xa4/0xb0 [ 1924.147292][T29853] [ 1924.147294][T29853] -> #2 (&rq->lock){-.-.}: [ 1924.147308][T29853] _raw_spin_lock+0x2f/0x40 [ 1924.147312][T29853] task_fork_fair+0x6a/0x520 [ 1924.147316][T29853] sched_fork+0x3af/0x900 [ 1924.147321][T29853] copy_process.part.0+0x1a25/0x6790 [ 1924.147324][T29853] _do_fork+0x25d/0xfe0 [ 1924.147328][T29853] kernel_thread+0x34/0x40 [ 1924.147332][T29853] rest_init+0x28/0x37b [ 1924.147336][T29853] arch_call_rest_init+0xe/0x1b [ 1924.147340][T29853] start_kernel+0x854/0x893 [ 1924.147345][T29853] x86_64_start_reservations+0x29/0x2b [ 1924.147349][T29853] x86_64_start_kernel+0x77/0x7b [ 1924.147353][T29853] secondary_startup_64+0xa4/0xb0 [ 1924.147356][T29853] [ 1924.147359][T29853] -> #1 (&p->pi_lock){-.-.}: [ 1924.147373][T29853] _raw_spin_lock_irqsave+0x95/0xcd [ 1924.147377][T29853] try_to_wake_up+0x90/0x13f0 [ 1924.147381][T29853] wake_up_process+0x10/0x20 [ 1924.147385][T29853] __up.isra.0+0x136/0x1a0 [ 1924.147388][T29853] up+0x9c/0xe0 [ 1924.147393][T29853] __up_console_sem+0xb7/0x1c0 [ 1924.147397][T29853] console_unlock+0x663/0xec0 [ 1924.147401][T29853] vprintk_emit+0x2a0/0x700 [ 1924.147405][T29853] vprintk_default+0x28/0x30 [ 1924.147409][T29853] vprintk_func+0x7e/0x189 [ 1924.147412][T29853] printk+0xba/0xed [ 1924.147416][T29853] do_exit.cold+0x5d/0x254 [ 1924.147421][T29853] do_group_exit+0x135/0x370 [ 1924.147425][T29853] __x64_sys_exit_group+0x44/0x50 [ 1924.147429][T29853] do_syscall_64+0xfd/0x680 [ 1924.147439][T29853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.147441][T29853] [ 1924.147444][T29853] -> #0 ((console_sem).lock){-.-.}: [ 1924.147458][T29853] lock_acquire+0x16f/0x3f0 [ 1924.147463][T29853] _raw_spin_lock_irqsave+0x95/0xcd [ 1924.147467][T29853] down_trylock+0x13/0x70 [ 1924.147471][T29853] __down_trylock_console_sem+0xa8/0x210 [ 1924.147475][T29853] console_trylock+0x15/0xa0 [ 1924.147480][T29853] vprintk_emit+0x283/0x700 [ 1924.147484][T29853] vprintk_default+0x28/0x30 [ 1924.147488][T29853] vprintk_func+0x7e/0x189 [ 1924.147492][T29853] printk+0xba/0xed [ 1924.147496][T29853] __warn_printk+0x9b/0xf3 [ 1924.147500][T29853] debug_print_object+0x168/0x250 [ 1924.147505][T29853] debug_check_no_obj_freed+0x29f/0x464 [ 1924.147508][T29853] kfree+0xbd/0x220 [ 1924.147512][T29853] kvfree+0x61/0x70 [ 1924.147516][T29853] netdev_freemem+0x4c/0x60 [ 1924.147520][T29853] netdev_release+0x86/0xb0 [ 1924.147524][T29853] device_release+0x7a/0x210 [ 1924.147528][T29853] kobject_put.cold+0x289/0x2e6 [ 1924.147533][T29853] netdev_run_todo+0x53b/0x7c0 [ 1924.147536][T29853] rtnl_unlock+0xe/0x10 [ 1924.147541][T29853] default_device_exit_batch+0x358/0x410 [ 1924.147546][T29853] ops_exit_list.isra.0+0xfc/0x150 [ 1924.147550][T29853] cleanup_net+0x3fb/0x960 [ 1924.147554][T29853] process_one_work+0x989/0x1790 [ 1924.147558][T29853] worker_thread+0x98/0xe40 [ 1924.147562][T29853] kthread+0x354/0x420 [ 1924.147566][T29853] ret_from_fork+0x24/0x30 [ 1924.147568][T29853] [ 1924.147573][T29853] other info that might help us debug this: [ 1924.147575][T29853] [ 1924.147578][T29853] Chain exists of: [ 1924.147581][T29853] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 1924.147599][T29853] [ 1924.147603][T29853] Possible unsafe locking scenario: [ 1924.147606][T29853] [ 1924.147610][T29853] CPU0 CPU1 [ 1924.147614][T29853] ---- ---- [ 1924.147617][T29853] lock(&obj_hash[i].lock); [ 1924.147626][T29853] lock(&rq->lock); [ 1924.147635][T29853] lock(&obj_hash[i].lock); [ 1924.147644][T29853] lock((console_sem).lock); [ 1924.147652][T29853] [ 1924.147655][T29853] *** DEADLOCK *** [ 1924.147658][T29853] [ 1924.147662][T29853] 4 locks held by kworker/u4:6/29853: [ 1924.147664][T29853] #0: 000000002d775ae2 ((wq_completion)netns){+.+.}, at: process_one_work+0x87e/0x1790 [ 1924.147682][T29853] #1: 00000000f3b42936 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 1924.147699][T29853] #2: 0000000000eeadea (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 1924.147716][T29853] #3: 000000000f831a18 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1924.147733][T29853] [ 1924.147737][T29853] stack backtrace: [ 1924.147742][T29853] CPU: 0 PID: 29853 Comm: kworker/u4:6 Not tainted 5.2.0-rc4+ #27 [ 1924.147749][T29853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1924.147753][T29853] Workqueue: netns cleanup_net [ 1924.147758][T29853] Call Trace: [ 1924.147762][T29853] dump_stack+0x172/0x1f0 [ 1924.147766][T29853] print_circular_bug.cold+0x1cc/0x28f [ 1924.147770][T29853] __lock_acquire+0x3755/0x5490 [ 1924.147774][T29853] ? mark_held_locks+0xf0/0xf0 [ 1924.147778][T29853] ? enable_ptr_key_workfn+0x30/0x30 [ 1924.147782][T29853] ? kvm_clock_read+0x18/0x30 [ 1924.147786][T29853] ? kvm_sched_clock_read+0x9/0x20 [ 1924.147790][T29853] lock_acquire+0x16f/0x3f0 [ 1924.147794][T29853] ? down_trylock+0x13/0x70 [ 1924.147798][T29853] _raw_spin_lock_irqsave+0x95/0xcd [ 1924.147802][T29853] ? down_trylock+0x13/0x70 [ 1924.147805][T29853] ? vprintk_emit+0x283/0x700 [ 1924.147809][T29853] down_trylock+0x13/0x70 [ 1924.147813][T29853] ? vprintk_emit+0x283/0x700 [ 1924.147817][T29853] __down_trylock_console_sem+0xa8/0x210 [ 1924.147821][T29853] console_trylock+0x15/0xa0 [ 1924.147825][T29853] vprintk_emit+0x283/0x700 [ 1924.147829][T29853] ? calc_wheel_index+0x220/0x220 [ 1924.147833][T29853] vprintk_default+0x28/0x30 [ 1924.147836][T29853] vprintk_func+0x7e/0x189 [ 1924.147840][T29853] printk+0xba/0xed [ 1924.147844][T29853] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1924.147848][T29853] ? mark_held_locks+0xf0/0xf0 [ 1924.147852][T29853] ? mark_held_locks+0xf0/0xf0 [ 1924.147856][T29853] ? __warn_printk+0x8f/0xf3 [ 1924.147860][T29853] ? queue_work_node+0x360/0x360 [ 1924.147863][T29853] __warn_printk+0x9b/0xf3 [ 1924.147867][T29853] ? add_taint.cold+0x16/0x16 [ 1924.147871][T29853] ? kasan_check_write+0x14/0x20 [ 1924.147875][T29853] ? lock_downgrade+0x880/0x880 [ 1924.147879][T29853] ? queue_work_node+0x360/0x360 [ 1924.147883][T29853] debug_print_object+0x168/0x250 [ 1924.147888][T29853] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1924.147892][T29853] debug_check_no_obj_freed+0x29f/0x464 [ 1924.147896][T29853] kfree+0xbd/0x220 [ 1924.147899][T29853] kvfree+0x61/0x70 [ 1924.147903][T29853] netdev_freemem+0x4c/0x60 [ 1924.147907][T29853] netdev_release+0x86/0xb0 [ 1924.147911][T29853] ? xps_cpus_store+0x2b0/0x2b0 [ 1924.147914][T29853] device_release+0x7a/0x210 [ 1924.147918][T29853] kobject_put.cold+0x289/0x2e6 [ 1924.147922][T29853] netdev_run_todo+0x53b/0x7c0 [ 1924.147926][T29853] ? register_netdev+0x50/0x50 [ 1924.147931][T29853] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 1924.147935][T29853] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1924.147939][T29853] ? net_set_todo+0xbf/0x150 [ 1924.147942][T29853] rtnl_unlock+0xe/0x10 [ 1924.147947][T29853] default_device_exit_batch+0x358/0x410 [ 1924.147951][T29853] ? unregister_netdevice_many+0x50/0x50 [ 1924.147955][T29853] ? default_device_exit+0x203/0x290 [ 1924.147959][T29853] ? do_wait_intr_irq+0x2b0/0x2b0 [ 1924.147963][T29853] ? rtnl_unlock+0xe/0x10 [ 1924.147967][T29853] ? unregister_netdevice_many+0x50/0x50 [ 1924.147972][T29853] ? dev_change_net_namespace+0xc70/0xc70 [ 1924.147976][T29853] ops_exit_list.isra.0+0xfc/0x150 [ 1924.147980][T29853] cleanup_net+0x3fb/0x960 [ 1924.147983][T29853] ? netns_install+0x1d0/0x1d0 [ 1924.147987][T29853] process_one_work+0x989/0x1790 [ 1924.147992][T29853] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1924.147996][T29853] ? lock_acquire+0x16f/0x3f0 [ 1924.147999][T29853] worker_thread+0x98/0xe40 [ 1924.148003][T29853] ? trace_hardirqs_on+0x67/0x220 [ 1924.148007][T29853] kthread+0x354/0x420 [ 1924.148011][T29853] ? process_one_work+0x1790/0x1790 [ 1924.148016][T29853] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1924.148020][T29853] ret_from_fork+0x24/0x30 [ 1924.149078][T29853] Kernel Offset: disabled [ 1925.072440][T29853] Rebooting in 86400 seconds..