0001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') syz_execute_func(&(0x7f0000000880)="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") syz_execute_func(&(0x7f0000000780)="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") 04:06:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) utime(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000008c0)) 04:06:22 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x300, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1686.116279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:22 executing program 5: pause() syz_execute_func(&(0x7f0000000580)="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") 04:06:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000f00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:22 executing program 1: syz_execute_func(&(0x7f0000000380)="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") 04:06:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) r3 = dup(r2) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000005}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x800000003, 0x0) recvmmsg(r4, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x1, 0x4) dup3(r5, r4, 0x0) r6 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r6, 0x1000000000015) 04:06:22 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x500, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1686.325178] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f601400000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:22 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x600, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1686.459906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1686.859208] device bridge_slave_1 left promiscuous mode [ 1686.865219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1686.940836] device bridge_slave_0 left promiscuous mode [ 1686.948047] bridge0: port 1(bridge_slave_0) entered disabled state [ 1687.140881] device hsr_slave_1 left promiscuous mode [ 1687.200936] device hsr_slave_0 left promiscuous mode [ 1687.266366] team0 (unregistering): Port device team_slave_1 removed [ 1687.312667] team0 (unregistering): Port device team_slave_0 removed [ 1687.324597] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1687.371367] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1687.473450] bond0 (unregistering): Released all slaves [ 1687.735279] net_ratelimit: 28 callbacks suppressed [ 1687.735288] protocol 88fb is buggy, dev hsr_slave_0 [ 1687.745706] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.055181] protocol 88fb is buggy, dev hsr_slave_0 [ 1688.060612] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.214959] protocol 88fb is buggy, dev hsr_slave_0 [ 1688.220093] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.294964] protocol 88fb is buggy, dev hsr_slave_0 [ 1688.300356] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.524362] IPVS: ftp: loaded support on port[0] = 21 [ 1688.635386] chnl_net:caif_netlink_parms(): no params data found [ 1688.686087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1688.692742] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.701396] device bridge_slave_0 entered promiscuous mode [ 1688.709771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1688.716540] bridge0: port 2(bridge_slave_1) entered disabled state [ 1688.724225] device bridge_slave_1 entered promiscuous mode [ 1688.747698] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1688.757625] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1688.779767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1688.787885] team0: Port device team_slave_0 added [ 1688.794187] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1688.802086] team0: Port device team_slave_1 added [ 1688.808132] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1688.815953] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1688.877593] device hsr_slave_0 entered promiscuous mode [ 1688.914976] device hsr_slave_1 entered promiscuous mode [ 1688.934837] protocol 88fb is buggy, dev hsr_slave_0 [ 1688.940057] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.955266] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1688.962507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1688.984943] bridge0: port 2(bridge_slave_1) entered blocking state [ 1688.991662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1688.998409] bridge0: port 1(bridge_slave_0) entered blocking state [ 1689.004844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1689.080724] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1689.087180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1689.096630] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1689.107105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1689.114397] bridge0: port 1(bridge_slave_0) entered disabled state [ 1689.121460] bridge0: port 2(bridge_slave_1) entered disabled state 04:06:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f002000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:25 executing program 5: syz_execute_func(&(0x7f0000001280)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae54e32bc32bc63796379020000c41455b3e61763632525000e81822e0fbdf980008080b79e3666420ff83d6ce1e40d491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c71c4237d7876fe7a56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff50c4e2ddac27660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f0f9a7e3b00f4e39b653e430f38ca790fca30caab6abbd9c40221911f1f2af32eaf00002665e94612b6c8c7d2fefe50000000d0818194d8004451ae88f4f42d92f9f928f3450f11a60000000040dc6f00c4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374fb0a07c401f1eb27c4a27d2a17eecccc36660f38058b976192361d09f5e5978047910002c1045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b5899999590f0f8153000000ae0f4401a9bb000042c4414974ec66aac4617ddd880c00000023") 04:06:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f00000001c0)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0xffffffffffffff76}, 0x71) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xedb1f0d6) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) [ 1689.129482] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1689.148700] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1689.156027] 8021q: adding VLAN 0 to HW filter on device team0 [ 1689.178141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1689.188583] bridge0: port 1(bridge_slave_0) entered blocking state [ 1689.195205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1689.218927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1689.240596] bridge0: port 2(bridge_slave_1) entered blocking state [ 1689.247092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1689.281676] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1689.302582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1689.333198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1689.348474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1689.359801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:06:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f002800000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1689.377660] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1689.395447] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1689.401694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1689.422512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1689.465425] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1689.507421] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:25 executing program 3: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f00000006c0)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae5460f71d31c7902000000de911455b3e617634c63e2e2000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f6880300000005666f0010d0000000066410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1ff2470f01c32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4f4c46185faa799f50000c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374d0fb0a070701f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae50240f4401faa9bb00004242414974bc0b31c4617ddd880c00000023") [ 1689.610493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f003f00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:25 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x700, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f004800000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1689.759307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1689.773854] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 04:06:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f004c00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1689.892360] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1689.904922] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:26 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1690.044185] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1690.376411] device bridge_slave_1 left promiscuous mode [ 1690.382599] bridge0: port 2(bridge_slave_1) entered disabled state [ 1690.425228] device bridge_slave_0 left promiscuous mode [ 1690.430810] bridge0: port 1(bridge_slave_0) entered disabled state [ 1690.557729] device hsr_slave_1 left promiscuous mode [ 1690.617959] device hsr_slave_0 left promiscuous mode [ 1690.698431] team0 (unregistering): Port device team_slave_1 removed [ 1690.708899] team0 (unregistering): Port device team_slave_0 removed [ 1690.721077] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1690.768347] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1690.838338] bond0 (unregistering): Released all slaves 04:06:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d02, 0x1]}) 04:06:28 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f006000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:28 executing program 1: clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x800, &(0x7f00000000c0)={0xa, 0x4e23, 0x40, @rand_addr="92778131abe4ec481e993050fdfe05bc", 0x80}, 0x1c) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 04:06:28 executing program 5: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f00000006c0)="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") [ 1692.287322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:28 executing program 1: pause() syz_execute_func(&(0x7f0000000100)="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") 04:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f146000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:28 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000040)={0xfffffffffffffffa, 0x0, "e3d07e41a7bf142f9788b6928fbc8d1b1868bce21430e64ccfc438e00ab5704a"}) 04:06:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400000000400) fcntl$lock(r1, 0x7, &(0x7f0000010000)) dup3(r0, r1, 0x0) 04:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f006800000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1692.501508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:28 executing program 5: pause() syz_execute_func(&(0x7f0000000600)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9c4c2a1385999363621b8c25cb100008d3581810000262f46d9f9c4c2b9b6b90000000000d2dec461e6172525000e818f470fc980008047f03acf8fe97c810f69e08f4cbec5c4c2858c3f2d56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b262933a603c0671f0ffff000068803000000016565605ba16f2aed9fdfeebf5f5eba225adeab413bc7b1f00efc421792b5524ef0008d2dc5600b150400f381da900e001c4e2d59134ff74d866dee4b6c442f191047b8f49580197feffff7f660f38de8e85e1f32646dec43b7d0f12e400f4260fe88c4200000000ca30cac46190546104f3450f2c6b0009912af3430f36f20ff08e6769b369c463ad0b5890ca6c0f84500000006466420f3a0b0100d800b36d6d8175ef9d8f000000c462a52b6e0bc4a17a4295f046839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa266681380010c40250f7a698b900008374fb0a07c40155f64e06f247acecedc4620d8e56b0470afc6b82e26263209797c1045c0b47ccc4c1fa113a389f9f140f0f2ef246e16dc481635a9c70d3813811fad7fbfbc941ecec31c4663ef0430fabb9080000007ddd460f544e080000c421e96719") [ 1692.678284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1693.094325] net_ratelimit: 26 callbacks suppressed [ 1693.094333] protocol 88fb is buggy, dev hsr_slave_0 [ 1693.105118] protocol 88fb is buggy, dev hsr_slave_1 [ 1693.974198] protocol 88fb is buggy, dev hsr_slave_0 [ 1693.979704] protocol 88fb is buggy, dev hsr_slave_1 [ 1694.091199] IPVS: ftp: loaded support on port[0] = 21 [ 1694.159208] chnl_net:caif_netlink_parms(): no params data found [ 1694.195121] bridge0: port 1(bridge_slave_0) entered blocking state [ 1694.201773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1694.208963] device bridge_slave_0 entered promiscuous mode [ 1694.216605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1694.223133] bridge0: port 2(bridge_slave_1) entered disabled state [ 1694.230252] device bridge_slave_1 entered promiscuous mode [ 1694.249980] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1694.259442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1694.277639] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1694.285585] team0: Port device team_slave_0 added [ 1694.291186] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1694.298926] team0: Port device team_slave_1 added [ 1694.304243] protocol 88fb is buggy, dev hsr_slave_0 [ 1694.304403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1694.309566] protocol 88fb is buggy, dev hsr_slave_1 [ 1694.317126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1694.386597] device hsr_slave_0 entered promiscuous mode [ 1694.424499] device hsr_slave_1 entered promiscuous mode [ 1694.454227] protocol 88fb is buggy, dev hsr_slave_0 [ 1694.459395] protocol 88fb is buggy, dev hsr_slave_1 [ 1694.465510] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1694.472684] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1694.488546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1694.495083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1694.501719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1694.508164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1694.534255] protocol 88fb is buggy, dev hsr_slave_0 [ 1694.539803] protocol 88fb is buggy, dev hsr_slave_1 [ 1694.550259] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1694.556876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1694.566081] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1694.575903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1694.583172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1694.590174] bridge0: port 2(bridge_slave_1) entered disabled state [ 1694.598359] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1694.609013] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1694.615654] 8021q: adding VLAN 0 to HW filter on device team0 [ 1694.625766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1694.633434] bridge0: port 1(bridge_slave_0) entered blocking state [ 1694.640239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1694.651497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1694.659673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1694.666307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1694.685807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1694.695127] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1694.708149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1694.722188] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1694.732602] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1694.745046] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1694.751687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1694.759369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1694.767135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1694.783321] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1694.795039] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000003c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) 04:06:31 executing program 1: syz_genetlink_get_family_id$tipc(0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 04:06:31 executing program 5: r0 = semget$private(0x0, 0x20000000107, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {0x3, 0xf9a4}], 0x2, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 04:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f006c00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:31 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1695.457731] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1695.469375] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1695.469375] The task syz-executor.5 (13500) triggered the difference, watch for misbehavior. 04:06:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x29, 0x0, @empty={[0x0, 0x0, 0x0, 0xff00]}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "c5771e", 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 04:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f007400000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:31 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 1695.695432] device bridge_slave_1 left promiscuous mode [ 1695.703876] bridge0: port 2(bridge_slave_1) entered disabled state 04:06:31 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) [ 1695.786639] device bridge_slave_0 left promiscuous mode [ 1695.792216] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="617813519375"], 0x6) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x12}) 04:06:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x401070c9, 0x0) [ 1696.094900] device hsr_slave_1 left promiscuous mode [ 1696.131377] device hsr_slave_0 left promiscuous mode [ 1696.194688] team0 (unregistering): Port device team_slave_1 removed [ 1696.246951] team0 (unregistering): Port device team_slave_0 removed [ 1696.303643] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1696.379710] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1696.482032] bond0 (unregistering): Released all slaves [ 1696.548758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1696.565536] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1697.574417] IPVS: ftp: loaded support on port[0] = 21 [ 1697.702347] chnl_net:caif_netlink_parms(): no params data found [ 1697.745047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.751647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1697.759194] device bridge_slave_0 entered promiscuous mode [ 1697.767661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1697.778399] bridge0: port 2(bridge_slave_1) entered disabled state [ 1697.788208] device bridge_slave_1 entered promiscuous mode [ 1697.824371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1697.841230] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1697.867680] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1697.876356] team0: Port device team_slave_0 added [ 1697.882378] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1697.890100] team0: Port device team_slave_1 added [ 1697.896075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1697.903798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1697.968011] device hsr_slave_0 entered promiscuous mode [ 1698.005515] device hsr_slave_1 entered promiscuous mode [ 1698.044968] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1698.052214] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1698.069118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.075758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1698.082603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.089307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1698.126125] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1698.132249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1698.138310] net_ratelimit: 20 callbacks suppressed [ 1698.138319] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.138389] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.158837] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1698.169004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1698.177198] bridge0: port 1(bridge_slave_0) entered disabled state [ 1698.184525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1698.192267] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1698.203278] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1698.210379] 8021q: adding VLAN 0 to HW filter on device team0 [ 1698.221673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1698.230945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.237641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1698.256178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1698.264739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.271125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1698.278748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1698.297288] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1698.307017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1698.314778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1698.322297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1698.336116] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1698.342289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1698.362674] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1698.375541] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:34 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:06:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000740)=""/4096, &(0x7f0000000300)=0x1000) socket$inet_udplite(0x2, 0x2, 0x88) r3 = memfd_create(0x0, 0x0) r4 = creat(0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) fcntl$setlease(r4, 0x400, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000180)={'team0\x00', 0xffffffff}) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, 0x0, 0x2000005) 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f007a00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000000680)="65c98ddaaece527eb6fa0488bd29115dd10013aeaa07b700b461d9ae393ffc8ed9759fb154a4d3b5", 0x28}], 0x1}}], 0x1, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 04:06:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) [ 1698.454305] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.454916] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.459545] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.465388] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.532722] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1698.584210] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.589417] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.614217] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.619361] protocol 88fb is buggy, dev hsr_slave_1 04:06:34 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4600, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffe8000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:34 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 04:06:34 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x0, 0x0) 04:06:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88006, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\\yzki\x00\x9a\r\xaa\x9c\v2\x02\x03\x00\x04', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000340)={@void, @val, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x44, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0xff23) [ 1698.772337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f008100000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x401070ca, 0x0) 04:06:34 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) gettid() ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000180)={'team0\x00', 0xffffffff}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x2000005) [ 1698.875641] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:34 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4800, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1698.980494] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1699.435004] device bridge_slave_1 left promiscuous mode [ 1699.440604] bridge0: port 2(bridge_slave_1) entered disabled state [ 1699.496287] device bridge_slave_0 left promiscuous mode [ 1699.501915] bridge0: port 1(bridge_slave_0) entered disabled state [ 1699.617273] device hsr_slave_1 left promiscuous mode [ 1699.670462] device hsr_slave_0 left promiscuous mode [ 1699.719337] team0 (unregistering): Port device team_slave_1 removed [ 1699.732653] team0 (unregistering): Port device team_slave_0 removed [ 1699.743317] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1699.779718] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1699.868207] bond0 (unregistering): Released all slaves 04:06:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88006, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\\yzki\x00\x9a\r\xaa\x9c\v2\x02\x03\x00\x04', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000340)={@void, @val={0x1}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x44, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0xff23) 04:06:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:37 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x100020, &(0x7f0000000680)) 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffec000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:37 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 04:06:37 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4c00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1701.679706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1701.718569] device lo left promiscuous mode 04:06:37 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 1701.783972] device bridge0 left promiscuous mode [ 1701.795225] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1701.812149] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000200), 0x4) 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00f000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1701.889315] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000740)=""/4096, &(0x7f0000000300)=0x1000) socket$inet_udplite(0x2, 0x2, 0x88) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = creat(0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) fcntl$setlease(r2, 0x400, 0x0) gettid() ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000180)={'team0\x00', 0xffffffff}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 04:06:38 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1702.000878] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:38 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00fc00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1702.247384] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1703.494273] net_ratelimit: 29 callbacks suppressed [ 1703.494281] protocol 88fb is buggy, dev hsr_slave_0 [ 1703.504702] protocol 88fb is buggy, dev hsr_slave_1 [ 1703.753797] IPVS: ftp: loaded support on port[0] = 21 [ 1703.832134] chnl_net:caif_netlink_parms(): no params data found [ 1703.867597] bridge0: port 1(bridge_slave_0) entered blocking state [ 1703.874267] bridge0: port 1(bridge_slave_0) entered disabled state [ 1703.882128] device bridge_slave_0 entered promiscuous mode [ 1703.890093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1703.896693] bridge0: port 2(bridge_slave_1) entered disabled state [ 1703.904206] device bridge_slave_1 entered promiscuous mode [ 1703.921502] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1703.930955] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1703.951161] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1703.958865] team0: Port device team_slave_0 added [ 1703.964933] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1703.972596] team0: Port device team_slave_1 added [ 1703.978333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1703.986092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1704.046815] device hsr_slave_0 entered promiscuous mode [ 1704.094788] device hsr_slave_1 entered promiscuous mode [ 1704.135018] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1704.142171] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1704.157866] bridge0: port 2(bridge_slave_1) entered blocking state [ 1704.164699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1704.171332] bridge0: port 1(bridge_slave_0) entered blocking state [ 1704.178174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1704.212662] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1704.219152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1704.228392] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1704.239601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1704.247062] bridge0: port 1(bridge_slave_0) entered disabled state [ 1704.253821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1704.261561] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1704.272288] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1704.278817] 8021q: adding VLAN 0 to HW filter on device team0 [ 1704.289147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1704.297989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1704.304548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1704.315275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1704.323278] bridge0: port 2(bridge_slave_1) entered blocking state [ 1704.329961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1704.350083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1704.358032] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1704.374343] protocol 88fb is buggy, dev hsr_slave_0 [ 1704.381131] protocol 88fb is buggy, dev hsr_slave_1 [ 1704.389604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1704.397595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1704.405498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1704.418382] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1704.424615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1704.440866] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1704.452650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1704.544348] protocol 88fb is buggy, dev hsr_slave_0 [ 1704.549822] protocol 88fb is buggy, dev hsr_slave_1 04:06:40 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 04:06:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000200)=0x9, 0x4) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f80fe00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x4000000000000001, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 04:06:40 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x5102, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1704.664344] protocol 88fb is buggy, dev hsr_slave_0 [ 1704.670257] protocol 88fb is buggy, dev hsr_slave_1 [ 1704.694211] protocol 88fb is buggy, dev hsr_slave_0 [ 1704.699490] protocol 88fb is buggy, dev hsr_slave_1 04:06:40 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6800, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="20000000220001050000000000000000009d3400"/34], 0x1}}, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/146, 0x92}], 0x1) [ 1704.815365] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340)={0x8}, 0x0, 0x0) 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001fc0fe00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000740)=""/4096, &(0x7f0000000300)=0x1000) socket$inet_udplite(0x2, 0x2, 0x88) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r3 = creat(0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) fcntl$setlease(r3, 0x400, 0x0) gettid() ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000180)={'team0\x00', 0xffffffff}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x2000005) 04:06:41 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1705.036256] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1705.066953] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00ff00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:41 executing program 5: [ 1705.225141] device bridge_slave_1 left promiscuous mode [ 1705.237589] bridge0: port 2(bridge_slave_1) entered disabled state [ 1705.315359] device bridge_slave_0 left promiscuous mode [ 1705.322542] bridge0: port 1(bridge_slave_0) entered disabled state [ 1705.640860] device hsr_slave_1 left promiscuous mode [ 1705.700168] device hsr_slave_0 left promiscuous mode [ 1705.759914] team0 (unregistering): Port device team_slave_1 removed [ 1705.797138] team0 (unregistering): Port device team_slave_0 removed [ 1705.829743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1705.890533] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1706.060689] bond0 (unregistering): Released all slaves [ 1706.118235] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1707.210830] IPVS: ftp: loaded support on port[0] = 21 [ 1707.301995] chnl_net:caif_netlink_parms(): no params data found [ 1707.363265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1707.370867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1707.378414] device bridge_slave_0 entered promiscuous mode [ 1707.386236] bridge0: port 2(bridge_slave_1) entered blocking state [ 1707.392749] bridge0: port 2(bridge_slave_1) entered disabled state [ 1707.410823] device bridge_slave_1 entered promiscuous mode [ 1707.433752] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1707.444055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1707.475463] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1707.483385] team0: Port device team_slave_0 added [ 1707.492431] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1707.500735] team0: Port device team_slave_1 added [ 1707.511759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1707.522978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1707.597239] device hsr_slave_0 entered promiscuous mode [ 1707.634586] device hsr_slave_1 entered promiscuous mode [ 1707.674930] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1707.682249] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1707.697034] bridge0: port 2(bridge_slave_1) entered blocking state [ 1707.703518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1707.710425] bridge0: port 1(bridge_slave_0) entered blocking state [ 1707.717004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1707.757411] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1707.763633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1707.773144] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1707.783305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1707.790588] bridge0: port 1(bridge_slave_0) entered disabled state [ 1707.797747] bridge0: port 2(bridge_slave_1) entered disabled state 04:06:43 executing program 3: 04:06:43 executing program 5: 04:06:43 executing program 1: 04:06:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f004003000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1707.805627] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1707.817482] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1707.823746] 8021q: adding VLAN 0 to HW filter on device team0 [ 1707.843141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1707.863507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1707.870156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1707.892410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1707.904375] bridge0: port 2(bridge_slave_1) entered blocking state 04:06:44 executing program 1: [ 1707.911061] bridge0: port 2(bridge_slave_1) entered forwarding state 04:06:44 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0x51}, 0x40002102) syz_execute_func(&(0x7f0000000100)="0f2a2ec4e27918eac4c1fa7f8b63e201d165660f692ec4c24da7e80f0f9f7036f983a08062392ac4e3257df5130f0d8900000020660f17a299899999") 04:06:44 executing program 3: [ 1707.967744] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:44 executing program 1: [ 1708.017000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1708.056374] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1708.068152] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1708.085040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1708.093875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1708.132404] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1708.145968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1708.175861] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1708.193329] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:44 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7100, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000340000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:44 executing program 5: 04:06:44 executing program 3: 04:06:44 executing program 1: 04:06:44 executing program 5: [ 1708.436743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1708.534251] net_ratelimit: 26 callbacks suppressed [ 1708.534260] protocol 88fb is buggy, dev hsr_slave_0 [ 1708.545270] protocol 88fb is buggy, dev hsr_slave_1 [ 1708.604203] protocol 88fb is buggy, dev hsr_slave_0 [ 1708.609511] protocol 88fb is buggy, dev hsr_slave_1 [ 1708.864248] protocol 88fb is buggy, dev hsr_slave_0 [ 1708.869652] protocol 88fb is buggy, dev hsr_slave_1 [ 1709.014245] protocol 88fb is buggy, dev hsr_slave_0 [ 1709.019502] protocol 88fb is buggy, dev hsr_slave_1 [ 1709.055259] device bridge_slave_1 left promiscuous mode [ 1709.060974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1709.094239] protocol 88fb is buggy, dev hsr_slave_0 [ 1709.099566] protocol 88fb is buggy, dev hsr_slave_1 [ 1709.116671] device bridge_slave_0 left promiscuous mode [ 1709.122588] bridge0: port 1(bridge_slave_0) entered disabled state [ 1709.239011] device hsr_slave_1 left promiscuous mode [ 1709.308295] device hsr_slave_0 left promiscuous mode [ 1709.348230] team0 (unregistering): Port device team_slave_1 removed [ 1709.361952] team0 (unregistering): Port device team_slave_0 removed [ 1709.372328] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1709.408811] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1709.482004] bond0 (unregistering): Released all slaves 04:06:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:47 executing program 1: 04:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffffff0000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:47 executing program 3: 04:06:47 executing program 5: 04:06:47 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7400, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:47 executing program 5: [ 1710.999010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:47 executing program 3: 04:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000010a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:47 executing program 1: 04:06:47 executing program 5: 04:06:47 executing program 3: [ 1711.200074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1712.753717] IPVS: ftp: loaded support on port[0] = 21 [ 1712.823245] chnl_net:caif_netlink_parms(): no params data found [ 1712.859449] bridge0: port 1(bridge_slave_0) entered blocking state [ 1712.866063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1712.873224] device bridge_slave_0 entered promiscuous mode [ 1712.880463] bridge0: port 2(bridge_slave_1) entered blocking state [ 1712.887036] bridge0: port 2(bridge_slave_1) entered disabled state [ 1712.894602] device bridge_slave_1 entered promiscuous mode [ 1712.912746] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1712.922411] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1712.941784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1712.949462] team0: Port device team_slave_0 added [ 1712.955396] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1712.963559] team0: Port device team_slave_1 added [ 1712.969638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1712.977135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1713.067611] device hsr_slave_0 entered promiscuous mode [ 1713.104774] device hsr_slave_1 entered promiscuous mode [ 1713.145880] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1713.153332] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1713.171164] bridge0: port 2(bridge_slave_1) entered blocking state [ 1713.177970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1713.184953] bridge0: port 1(bridge_slave_0) entered blocking state [ 1713.191435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1713.230151] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1713.237119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1713.246526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1713.257587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1713.265508] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.274410] bridge0: port 2(bridge_slave_1) entered disabled state [ 1713.282095] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1713.295123] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1713.301485] 8021q: adding VLAN 0 to HW filter on device team0 [ 1713.312788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1713.320689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1713.327122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1713.338236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1713.346660] bridge0: port 2(bridge_slave_1) entered blocking state [ 1713.353069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1713.375872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1713.383862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1713.391910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1713.400000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1713.413213] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1713.423978] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1713.430471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1713.438221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1713.454885] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1713.467524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1713.544296] net_ratelimit: 20 callbacks suppressed [ 1713.544334] protocol 88fb is buggy, dev hsr_slave_0 [ 1713.554709] protocol 88fb is buggy, dev hsr_slave_1 [ 1713.664263] protocol 88fb is buggy, dev hsr_slave_0 [ 1713.669668] protocol 88fb is buggy, dev hsr_slave_1 [ 1713.794225] protocol 88fb is buggy, dev hsr_slave_0 [ 1713.799849] protocol 88fb is buggy, dev hsr_slave_1 [ 1713.904208] protocol 88fb is buggy, dev hsr_slave_0 [ 1713.909387] protocol 88fb is buggy, dev hsr_slave_1 [ 1713.914749] protocol 88fb is buggy, dev hsr_slave_0 [ 1713.919895] protocol 88fb is buggy, dev hsr_slave_1 04:06:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:50 executing program 1: 04:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000020a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:50 executing program 3: 04:06:50 executing program 5: 04:06:50 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1714.129650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:50 executing program 3: 04:06:50 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 04:06:50 executing program 1: pause() syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000040)="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") msgget$private(0x0, 0x10) 04:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000030a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1714.304982] device bridge_slave_1 left promiscuous mode [ 1714.310546] bridge0: port 2(bridge_slave_1) entered disabled state 04:06:50 executing program 3: pause() syz_execute_func(&(0x7f00000003c0)="c4e3f9614832074a2be9c4023998d7410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038218d00a30000262ff342906646da4e3292a16379637902000000dec41455b3e61763632525000e8182b00080008080e285660fe2830e000000cf491e2f16f0410f117b0969e08f4cbec5c46248f3cd8f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7640fe486304dd1cec485e1f326470f5f103b7d0f12e400f467470fae70d23830ca30caab6abbd9c40221911f1f2af3420f2a520047da73092665e94612b6c800008450000000d0818194d8004451ae88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0414c598374fb0a07c401f1eb27f247acf5ecec36660f38058b976192360ffc834c00000066470f79e10002c1045c0b47dc47ccaf268111a989000065002d08000000c4417913a299b589999959060f0f8153000000ae0f4401a9bb000042c4414974ec0b31c4617ddd880c00000035220e") [ 1714.395406] device bridge_slave_0 left promiscuous mode [ 1714.403085] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:50 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000001c0)="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") [ 1714.709814] device hsr_slave_1 left promiscuous mode [ 1714.752053] device hsr_slave_0 left promiscuous mode [ 1714.811694] team0 (unregistering): Port device team_slave_1 removed [ 1714.850206] team0 (unregistering): Port device team_slave_0 removed [ 1714.882608] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1714.949616] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1715.027744] bond0 (unregistering): Released all slaves [ 1715.078083] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1715.093202] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1716.121736] IPVS: ftp: loaded support on port[0] = 21 [ 1716.250241] chnl_net:caif_netlink_parms(): no params data found [ 1716.293591] bridge0: port 1(bridge_slave_0) entered blocking state [ 1716.301133] bridge0: port 1(bridge_slave_0) entered disabled state [ 1716.308729] device bridge_slave_0 entered promiscuous mode [ 1716.316701] bridge0: port 2(bridge_slave_1) entered blocking state [ 1716.323149] bridge0: port 2(bridge_slave_1) entered disabled state [ 1716.331371] device bridge_slave_1 entered promiscuous mode [ 1716.356513] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1716.367438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1716.392661] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1716.402943] team0: Port device team_slave_0 added [ 1716.409270] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1716.418660] team0: Port device team_slave_1 added [ 1716.424472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1716.433910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1716.487860] device hsr_slave_0 entered promiscuous mode [ 1716.524464] device hsr_slave_1 entered promiscuous mode [ 1716.595127] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1716.602717] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1716.618952] bridge0: port 2(bridge_slave_1) entered blocking state [ 1716.625527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1716.632561] bridge0: port 1(bridge_slave_0) entered blocking state [ 1716.639435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1716.679313] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1716.692308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1716.701564] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1716.712574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1716.720560] bridge0: port 1(bridge_slave_0) entered disabled state [ 1716.727614] bridge0: port 2(bridge_slave_1) entered disabled state [ 1716.735514] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1716.745969] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1716.752196] 8021q: adding VLAN 0 to HW filter on device team0 [ 1716.764403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1716.772335] bridge0: port 1(bridge_slave_0) entered blocking state [ 1716.778977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1716.794978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1716.803080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1716.809631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1716.827415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1716.838101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1716.847380] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1716.866079] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1716.878366] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1716.888968] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1716.895985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1716.904643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1716.912934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1716.931649] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1716.943350] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:53 executing program 3: pause() syz_execute_func(&(0x7f0000000800)="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") 04:06:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000040a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:53 executing program 1: 04:06:53 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000f80)="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") 04:06:53 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xff00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:53 executing program 1: syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000001500)="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") [ 1717.183891] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000050a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:53 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x898f2, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:53 executing program 3: syz_execute_func(&(0x7f00000006c0)="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") syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) [ 1717.424895] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:53 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x92749, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000060a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1717.691786] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1717.805477] device bridge_slave_1 left promiscuous mode [ 1717.812479] bridge0: port 2(bridge_slave_1) entered disabled state [ 1717.885963] device bridge_slave_0 left promiscuous mode [ 1717.893579] bridge0: port 1(bridge_slave_0) entered disabled state [ 1718.076741] device hsr_slave_1 left promiscuous mode [ 1718.139260] device hsr_slave_0 left promiscuous mode [ 1718.179595] team0 (unregistering): Port device team_slave_1 removed [ 1718.217153] team0 (unregistering): Port device team_slave_0 removed [ 1718.253554] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1718.280294] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1718.358456] bond0 (unregistering): Released all slaves [ 1718.934242] net_ratelimit: 28 callbacks suppressed [ 1718.934251] protocol 88fb is buggy, dev hsr_slave_0 [ 1718.944344] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.254200] protocol 88fb is buggy, dev hsr_slave_0 [ 1719.259528] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.414216] protocol 88fb is buggy, dev hsr_slave_0 [ 1719.419325] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.473245] IPVS: ftp: loaded support on port[0] = 21 [ 1719.494300] protocol 88fb is buggy, dev hsr_slave_0 [ 1719.499540] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.609925] chnl_net:caif_netlink_parms(): no params data found [ 1719.655020] bridge0: port 1(bridge_slave_0) entered blocking state [ 1719.661455] bridge0: port 1(bridge_slave_0) entered disabled state [ 1719.680326] device bridge_slave_0 entered promiscuous mode [ 1719.688248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1719.700438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1719.710045] device bridge_slave_1 entered promiscuous mode [ 1719.741837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1719.751918] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1719.771364] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1719.778846] team0: Port device team_slave_0 added [ 1719.784712] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1719.792166] team0: Port device team_slave_1 added [ 1719.797766] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1719.805322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1719.856286] device hsr_slave_0 entered promiscuous mode [ 1719.904594] device hsr_slave_1 entered promiscuous mode [ 1719.944934] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1719.952172] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1719.968248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1719.974835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1719.981614] bridge0: port 1(bridge_slave_0) entered blocking state [ 1719.989017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1720.029915] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1720.037146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1720.046188] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1720.056900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1720.065568] bridge0: port 1(bridge_slave_0) entered disabled state [ 1720.072322] bridge0: port 2(bridge_slave_1) entered disabled state [ 1720.080143] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1720.091116] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1720.097848] 8021q: adding VLAN 0 to HW filter on device team0 [ 1720.108056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1720.116325] bridge0: port 1(bridge_slave_0) entered blocking state [ 1720.122874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1720.134253] protocol 88fb is buggy, dev hsr_slave_0 [ 1720.139527] protocol 88fb is buggy, dev hsr_slave_1 [ 1720.146892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1720.155352] bridge0: port 2(bridge_slave_1) entered blocking state [ 1720.161785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1720.169630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1720.184652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1720.192138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1720.200454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1720.212593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1720.226608] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 04:06:56 executing program 3: pause() syz_execute_func(&(0x7f00000001c0)="c4e3f9614832074a2be9c4023998d7410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038218d00a30000262ff342906646da4e3292a16379637902000000dec41455b3e61763632525000e8182b00080008080e285660fe2830e000000cf491e2f16f0410f117b0969e08f4cbec5c46248f3cd8f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7640fe486304dd1cec485e1f326470f5f103b7d0f12e400f467470fae70d23830ca30caab6abbd9c465def066661f1f2af3420f2a520047da73092665e94612b6c800008450000000d0818194d8004451ae88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0414c598374fb0a07c401f1eb27f247acf5ecec36660f38058b976192360ffc834c00000066470f79e10002c1045c0b47dc47ccaf268111a989000065002d08000000c4417913a299b589999959060f0f8153000000ae0f4401a9bb000042c4414974ec0b31c4617ddd880c00000035220e") 04:06:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:56 executing program 1: syz_execute_func(&(0x7f0000000140)="9877774a2ae92cb81c050f05bffa254000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000008c0)="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") 04:06:56 executing program 5: pause() syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000040)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9c4c2a1385999c421b8c25cb100008d3581810000262f46d9f96646da4e32c4c2b9b6b90000000000d2dec461dc55b1e6172525000e818f470fc980008047f03acf8fe97c810f69e08f4cbec5c4c2858c3f2d56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b2660f3a603d06f0ffff000f688030000000564105ba16f2aed9fdfeebf5f5eba225adeab413bc7b1f00efc481fa706b00f9ef0008e4a25600b150400f381da900e001c4e2d59134ff74d866dee4b6c442f191047b8f49580197feffff7f660f38de8e85e1f32646dec43b7d0f12e400f4260fe88c4200000000ca30cac46190546104f3450f2c6b0009912af3430fc4c17829c8c463ad0b5890ca6c0f84500000006466420f3a0b0100d8008fe978e16a85b36d6d8175ef9d8f000000c462a52b6e0bc4a17a4295f046839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa266681380010c40250f7a698b900008374fb0a07c40155f64e06f247acecedc4620d8e56b0470afc6b82e26263209797c1045c0b47cc5c389f9f140f0f2ef246e16dc481635a9c70d3813811fad7fbfbc941ecec31c4663ef0430fabb9080000007ddd880c0000003422") r0 = msgget$private(0x0, 0x10) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000340), &(0x7f00000003c0)=0x4) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)=0x6) msgrcv(r0, &(0x7f0000000240)={0x0, ""/232}, 0xf0, 0x0, 0x800) 04:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000070a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1720.232988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1720.253391] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1720.283299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1720.320276] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000000a0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:56 executing program 3: pause() syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000040)="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") r0 = msgget$private(0x0, 0x10) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)=0x6) msgrcv(r0, &(0x7f0000000240)={0x0, ""/232}, 0xf0, 0x0, 0x800) 04:06:56 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x100000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000000f0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1720.510405] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000200a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1720.629241] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1720.644781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:56 executing program 3: syz_execute_func(&(0x7f0000000140)="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") syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_genetlink_get_family_id$net_dm(0x0) 04:06:56 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x400000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000280a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1720.813253] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1720.972159] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1721.244935] device bridge_slave_1 left promiscuous mode [ 1721.250593] bridge0: port 2(bridge_slave_1) entered disabled state [ 1721.295575] device bridge_slave_0 left promiscuous mode [ 1721.301215] bridge0: port 1(bridge_slave_0) entered disabled state [ 1721.417315] device hsr_slave_1 left promiscuous mode [ 1721.459987] device hsr_slave_0 left promiscuous mode [ 1721.520310] team0 (unregistering): Port device team_slave_1 removed [ 1721.531619] team0 (unregistering): Port device team_slave_0 removed [ 1721.543568] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1721.588282] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1721.680898] bond0 (unregistering): Released all slaves 04:06:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:59 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6b6b6b, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:06:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000003f0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:59 executing program 1: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000d80)="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") 04:06:59 executing program 5: syz_execute_func(&(0x7f0000000100)="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") syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000001500)="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") 04:06:59 executing program 3: syz_execute_func(&(0x7f0000000140)="9877774a2ae92cb81c050f05bffa254000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000008c0)="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") [ 1723.449753] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:59 executing program 5: pause() syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000040)="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") msgget$private(0x0, 0x10) dup2(0xffffffffffffff9c, 0xffffffffffffffff) [ 1723.519169] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:06:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000480a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:06:59 executing program 3: syz_execute_func(&(0x7f0000000780)="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") [ 1723.702547] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000004c0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1723.915341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:00 executing program 3: syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f00000001c0)="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") [ 1723.978517] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000600a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1724.146594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1724.184407] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1724.294256] net_ratelimit: 26 callbacks suppressed [ 1724.294265] protocol 88fb is buggy, dev hsr_slave_0 [ 1724.304654] protocol 88fb is buggy, dev hsr_slave_1 [ 1725.174218] protocol 88fb is buggy, dev hsr_slave_0 [ 1725.179380] protocol 88fb is buggy, dev hsr_slave_1 [ 1725.492359] IPVS: ftp: loaded support on port[0] = 21 [ 1725.499360] protocol 88fb is buggy, dev hsr_slave_0 [ 1725.499415] protocol 88fb is buggy, dev hsr_slave_1 [ 1725.570298] chnl_net:caif_netlink_parms(): no params data found [ 1725.604924] bridge0: port 1(bridge_slave_0) entered blocking state [ 1725.612033] bridge0: port 1(bridge_slave_0) entered disabled state [ 1725.619895] device bridge_slave_0 entered promiscuous mode [ 1725.627009] bridge0: port 2(bridge_slave_1) entered blocking state [ 1725.633574] bridge0: port 2(bridge_slave_1) entered disabled state [ 1725.640909] device bridge_slave_1 entered promiscuous mode [ 1725.654213] protocol 88fb is buggy, dev hsr_slave_0 [ 1725.659450] protocol 88fb is buggy, dev hsr_slave_1 [ 1725.669025] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1725.678439] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1725.698445] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1725.706279] team0: Port device team_slave_0 added [ 1725.712057] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1725.719889] team0: Port device team_slave_1 added [ 1725.725587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1725.733592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1725.740729] protocol 88fb is buggy, dev hsr_slave_0 [ 1725.740799] protocol 88fb is buggy, dev hsr_slave_1 [ 1725.797954] device hsr_slave_0 entered promiscuous mode [ 1725.835779] device hsr_slave_1 entered promiscuous mode [ 1725.874811] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1725.881808] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1725.898146] bridge0: port 2(bridge_slave_1) entered blocking state [ 1725.904617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1725.911223] bridge0: port 1(bridge_slave_0) entered blocking state [ 1725.917630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1725.955880] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1725.961972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1725.972149] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1725.981326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1725.989952] bridge0: port 1(bridge_slave_0) entered disabled state [ 1725.996816] bridge0: port 2(bridge_slave_1) entered disabled state [ 1726.003942] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1726.014863] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1726.021139] 8021q: adding VLAN 0 to HW filter on device team0 [ 1726.032528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1726.040732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1726.047255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1726.061249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1726.069163] bridge0: port 2(bridge_slave_1) entered blocking state [ 1726.075535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1726.095726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1726.112859] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1726.122849] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1726.133536] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1726.140557] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1726.148168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1726.156119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1726.163754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1726.171794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1726.187510] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1726.199501] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:02 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x80ffff, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000014600a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:02 executing program 1: syz_execute_func(&(0x7f0000000780)="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") 04:07:02 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_open_dev$rtc(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="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") 04:07:02 executing program 3: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") [ 1726.461926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000680a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:02 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1726.697818] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000006c0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1726.978283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000740a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1727.095887] device bridge_slave_1 left promiscuous mode [ 1727.102168] bridge0: port 2(bridge_slave_1) entered disabled state [ 1727.175529] device bridge_slave_0 left promiscuous mode [ 1727.181249] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:03 executing program 5: syz_execute_func(&(0x7f0000000440)="f3400f2c304a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae5460f71d31c7902000000de911455b3e617634c63e2e2000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f6880300000005666f0010d0000000066410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1ff2470f01c32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4d4c46185faa799f50000c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374d0fb0a0707c4a1f8100aeb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae5024faa9bb00004236f244aa0b31c4617ddd880c00000023") 04:07:03 executing program 3: syz_execute_func(&(0x7f00000006c0)="f3400f2c304a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae5460f71d31c7902000000de911455b3e617634c63e2e2000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f6880300000005666f0010d0000000066410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1ff2470f01c32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4d4c46185faa799f50000c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374d0fb0a070701f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae5024faa9bb00004242414974bc0b31c4617ddd880c00000023") 04:07:03 executing program 1: pause() syz_execute_func(&(0x7f0000000680)="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") [ 1727.490353] device hsr_slave_1 left promiscuous mode [ 1727.558192] device hsr_slave_0 left promiscuous mode [ 1727.629650] team0 (unregistering): Port device team_slave_1 removed [ 1727.677892] team0 (unregistering): Port device team_slave_0 removed 04:07:03 executing program 1: syz_execute_func(&(0x7f0000000e00)="c4e3f9614832072be966420f72f0f5980f05aec4a37bf0c50341e2e9c443156c82feefffff00f34a0f38f6142f2f218d00a30000262f44d2313f90c4611dd919d9b157000000c6c100dc55b1e6172525000e81420f29fbc44149e8a0008000008f6978d7569e80e2858fe9d093de7b8fe97c810f43f77589f08f09bec5c4c28566420f3837dbf28090765858266465460f9f8b1ce7561300d9c4c1a9ef5edb43d08a1e1200005959267a06c4c111faea614848410ffe3ac421ddeb4c870428ff2c0fbc7b1f000000fe8f08e4a25600b135580958090000666566410f382aaf6e073d93672ef30f51c965440f2cdfc4617b708cfa00000000008cd4664bab664bab50275027381ec18d8bfe400f0d50003667660f75f73b417d0f0f4fbd0d64f3e1bb00e4e4c481a9f285068000008c4200000000ca30c8bb3cbb3c0209912af343db0f0fbb00be53080000c422092f845015000000849200c44258f313d800d800dd8fc4618160ecf578d339390b0bf20bf267660f13617c95589cc4a3516a876e00000000cec3c422d93e98000000807c302df904b20035cb0c0ce416a17c100397a862b274c497850480004dcdcd378100080000ddc4c1f9fc0ec4e1add5bb5d5d0000485c7ec4ce2dc1064d064d040000c422e6912cb1c40155f64e0666460fddc79fed36660f38058b976192368f294801d1c481fd2f5a80509797910002c1045c0b47cc47cc5cc481bbd095000001002ef246e16d89004242c401f82e14dc2941eee8310e617ddd880c00e405f5c71606df6920") [ 1727.745532] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1727.810333] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1728.077035] bond0 (unregistering): Released all slaves 04:07:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000007a0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:04 executing program 5: syz_execute_func(&(0x7f0000000880)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') syz_execute_func(&(0x7f0000000780)="c4e379614832074a2be92cbd980f053ef3aec4a37bf0c50141e2e922eb66d995f2144006262fed80660f38463da16379638fa97c8023000000f2d2dec4427921510b0061007eea518f29f09780992c1dd2fa3ce1491e2f16c2e54cc54cbec5c54d0f2c718f566beeee42319ebb70fe6581f0430fc0b2c4c2999793090000001c58660f38402dd16e00001e4105ba36f2ae66410f3a16288866410fd1e426660fdf53096bd104a8e1430fae27c4a27921f97cd8c4213a5fc066420f383bd46767460f330000f4835a00053830ca30cac442fd21b19b0b0000ef00ddeac4c2801d9c96c9e8e9362665e94612c8009aeed0818107d800002ddd8f0b00c4a17ae642958f49c09597f1ffffffffd29efbfb36646466264683b9080000000d34f82e440fdd06d92a41afa20f6baf00c4e39978c1d4c0414c73595974fb0a070f00ac1e00000000accd58edc4037d092101669dc40145d47e3636f765979722045c0b47cc474cf92f5c65002d08000000439b42a7a72856564401a9bb00004265f045836fb400d53131fbc4a27508313bec") 04:07:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000810a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:04 executing program 3: syz_execute_func(&(0x7f0000000880)="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") syz_execute_func(&(0x7f0000000080)="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") [ 1728.483522] nla_parse: 3 callbacks suppressed [ 1728.483532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1728.501233] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1729.334253] net_ratelimit: 20 callbacks suppressed [ 1729.334262] protocol 88fb is buggy, dev hsr_slave_0 [ 1729.344392] protocol 88fb is buggy, dev hsr_slave_1 [ 1729.353533] IPVS: ftp: loaded support on port[0] = 21 [ 1729.473523] chnl_net:caif_netlink_parms(): no params data found [ 1729.523258] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.529993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.537737] device bridge_slave_0 entered promiscuous mode [ 1729.545424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.551880] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.559015] device bridge_slave_1 entered promiscuous mode [ 1729.582200] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1729.592142] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1729.613497] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1729.621300] team0: Port device team_slave_0 added [ 1729.627326] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1729.635037] team0: Port device team_slave_1 added [ 1729.640508] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1729.648154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1729.664174] protocol 88fb is buggy, dev hsr_slave_0 [ 1729.670933] protocol 88fb is buggy, dev hsr_slave_1 [ 1729.726298] device hsr_slave_0 entered promiscuous mode [ 1729.764501] device hsr_slave_1 entered promiscuous mode [ 1729.804737] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1729.811995] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1729.818846] protocol 88fb is buggy, dev hsr_slave_0 [ 1729.818919] protocol 88fb is buggy, dev hsr_slave_1 [ 1729.840479] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.846987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1729.854365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.860770] bridge0: port 1(bridge_slave_0) entered forwarding state 04:07:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) [ 1729.895802] protocol 88fb is buggy, dev hsr_slave_0 [ 1729.900950] protocol 88fb is buggy, dev hsr_slave_1 [ 1729.907313] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1729.913409] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1729.923290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1729.932730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1729.941030] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.948128] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.956149] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1729.967828] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1729.989199] 8021q: adding VLAN 0 to HW filter on device team0 [ 1730.008036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1730.016143] bridge0: port 1(bridge_slave_0) entered blocking state [ 1730.022624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1730.033780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1730.042552] bridge0: port 2(bridge_slave_1) entered blocking state [ 1730.048960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1730.066583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1730.075105] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1730.088318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1730.102359] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1730.113708] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1730.124371] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1730.131465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1730.139312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1730.147925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1730.163884] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1730.177687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1730.244289] protocol 88fb is buggy, dev hsr_slave_0 [ 1730.249667] protocol 88fb is buggy, dev hsr_slave_1 04:07:06 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001fffffff9e0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:06 executing program 1: pause() syz_execute_func(&(0x7f0000000300)="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") 04:07:06 executing program 3: syz_execute_func(&(0x7f0000000dc0)="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") syz_execute_func(&(0x7f0000000540)="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") 04:07:06 executing program 5: syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000880)="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") syz_execute_func(&(0x7f0000000780)="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") [ 1730.452611] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1730.468655] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffffffff00a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:06 executing program 1: syz_execute_func(&(0x7f00000001c0)="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") 04:07:06 executing program 3: syz_execute_func(&(0x7f0000000480)="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") 04:07:06 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1730.657796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffffffff50a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:06 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1730.881498] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1731.145195] device bridge_slave_1 left promiscuous mode [ 1731.151068] bridge0: port 2(bridge_slave_1) entered disabled state [ 1731.205480] device bridge_slave_0 left promiscuous mode [ 1731.211694] bridge0: port 1(bridge_slave_0) entered disabled state [ 1731.397545] device hsr_slave_1 left promiscuous mode [ 1731.440358] device hsr_slave_0 left promiscuous mode [ 1731.488815] team0 (unregistering): Port device team_slave_1 removed [ 1731.511141] team0 (unregistering): Port device team_slave_0 removed [ 1731.535682] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1731.570239] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1731.642012] bond0 (unregistering): Released all slaves [ 1732.624622] IPVS: ftp: loaded support on port[0] = 21 [ 1732.775575] chnl_net:caif_netlink_parms(): no params data found [ 1732.813439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1732.820054] bridge0: port 1(bridge_slave_0) entered disabled state [ 1732.827714] device bridge_slave_0 entered promiscuous mode [ 1732.837532] bridge0: port 2(bridge_slave_1) entered blocking state [ 1732.844000] bridge0: port 2(bridge_slave_1) entered disabled state [ 1732.851609] device bridge_slave_1 entered promiscuous mode [ 1732.873354] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1732.883247] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1732.904674] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1732.912340] team0: Port device team_slave_0 added [ 1732.918335] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1732.926813] team0: Port device team_slave_1 added [ 1732.932312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1732.940000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 04:07:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000fc0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:09 executing program 5: pause() syz_execute_func(&(0x7f0000001100)="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") 04:07:09 executing program 1: pause() syz_execute_func(&(0x7f0000001380)="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") 04:07:09 executing program 3: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000240)="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") [ 1732.996388] device hsr_slave_0 entered promiscuous mode [ 1733.025095] device hsr_slave_1 entered promiscuous mode [ 1733.065553] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1733.084845] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1733.092088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 04:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffffffffc0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1733.181165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1733.187884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1733.194709] bridge0: port 1(bridge_slave_0) entered blocking state [ 1733.201102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1733.284853] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1733.292540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1733.301961] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1733.315958] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1733.327467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1733.337792] bridge0: port 1(bridge_slave_0) entered disabled state [ 1733.346186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1733.354932] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1733.371012] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 04:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000080fe0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1733.390560] 8021q: adding VLAN 0 to HW filter on device team0 [ 1733.413838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1733.425261] bridge0: port 1(bridge_slave_0) entered blocking state [ 1733.432130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1733.453004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1733.461783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1733.468401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1733.505816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1733.520914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1733.533283] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1733.546782] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1733.561851] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1733.574418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1733.586012] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1733.593301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1733.602351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000c0fe0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1733.628008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1733.641256] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1733.666151] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000ff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1733.766599] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:10 executing program 5: syz_execute_func(&(0x7f0000000840)="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") 04:07:10 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') syz_execute_func(&(0x7f0000000780)="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") [ 1733.918587] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:10 executing program 3: pause() r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f0000000040)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c94590c4e2d593a47ef39900008d00a30000262ff342906646da4e3292a16379637902000000de021455b3e61763632525000e8182b00080008080e285660fe2830e000000491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68806241000057d85ced8e66410f3a162888f3af0000c4a171f593fe41ff5009098f69609b5687f30fae60008f0978e18de6315264c4e2292f6300c4a23a5fc0660f38de8e85e1f326470f5f103667f342df62d812fcc402d10472f8e39b3825ca30caab6abbd9c402219164f0470fab392af3420f2a52009f003e00008450007700d0818194d8004451ae88f4f4932d92fdf9a8a8a17ae64295c481c4591bc4a1ab7cb00080000045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0414c598374fb0a07c501f1ea27f247aceced36660f38058b976192360047910002c1045c0b47dc47ccaf268111a989000065002d08000000c4417913a299b58999995906c421fa2d4ec80f3701a9bb0000428e41eb74ec0b31660f383af73523") [ 1734.674995] device bridge_slave_1 left promiscuous mode [ 1734.680705] bridge0: port 2(bridge_slave_1) entered disabled state [ 1734.694288] net_ratelimit: 34 callbacks suppressed [ 1734.694296] protocol 88fb is buggy, dev hsr_slave_0 [ 1734.704768] protocol 88fb is buggy, dev hsr_slave_1 [ 1734.735096] device bridge_slave_0 left promiscuous mode [ 1734.740978] bridge0: port 1(bridge_slave_0) entered disabled state [ 1734.891473] device hsr_slave_1 left promiscuous mode [ 1734.929486] device hsr_slave_0 left promiscuous mode [ 1734.969571] team0 (unregistering): Port device team_slave_1 removed [ 1734.980254] team0 (unregistering): Port device team_slave_0 removed [ 1734.991820] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1735.019850] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1735.122156] bond0 (unregistering): Released all slaves [ 1735.574177] protocol 88fb is buggy, dev hsr_slave_0 [ 1735.579347] protocol 88fb is buggy, dev hsr_slave_1 [ 1735.894193] protocol 88fb is buggy, dev hsr_slave_0 [ 1735.899326] protocol 88fb is buggy, dev hsr_slave_1 [ 1736.054201] protocol 88fb is buggy, dev hsr_slave_0 [ 1736.059697] protocol 88fb is buggy, dev hsr_slave_1 04:07:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:12 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x5000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:12 executing program 3: syz_execute_func(&(0x7f0000000700)="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") r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000a40)}}], 0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000d80)="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") 04:07:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00f0ffff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:12 executing program 5: syz_execute_func(&(0x7f0000000600)="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") 04:07:12 executing program 1: syz_execute_func(&(0x7f0000000000)="c4e379614832074a2be93693980f053ef3aec4a37bf0c50141e2e90f6839262e66450f38218d00000000262ff34290660f8fc978c61ba16379637902000000f2d2dec461dc55b1e62500000f018200000080c4e2859ecf491e2f16c2e54ce08f4cbec5c54d072c718f56c42239b84900d917f0430fc0b267f34cb4460f688030000000564105ba16f2ae66410f3a162888c423c96cb83d000000fe7341ff500909660fdf53098f69609b5687a8e1430fae277cd8d8a1a12ad764b5c1c4213a5fc0660f38de8e85e1f326c00f383bd4f20f12e40000f4c4227d23363830ca30ca400f38253d03000000c4022191842a090000002665e94612c8009ad0818194d8004325250000002ddd8f0b00c4a17ae64295807b1cffc4c3bd7c6d830045790c64e42e440fdd06e9e9b2aad9c70f485c5e2ea20f6baf00c4e39978c4c2712e51f5414c598374fb0a07b3ddaccd48eced36660f38058b976192361249e5e5978047910002c1045c0b47cc47cc2f5c65002d08000000c4e3e549d000420fae06085e0f4401a9bb000042c4414974ec0b31dbc97bec") syz_execute_func(&(0x7f0000000540)="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") [ 1736.134189] protocol 88fb is buggy, dev hsr_slave_0 [ 1736.139435] protocol 88fb is buggy, dev hsr_slave_1 [ 1736.203287] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f7fffffff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:12 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000580)="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") [ 1736.462387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f9effffff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1736.679516] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ff0ffffff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:12 executing program 3: syz_execute_func(&(0x7f0000000dc0)="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") syz_execute_func(&(0x7f00000008c0)="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") [ 1736.889036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ff5ffffff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1737.059232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1738.339108] IPVS: ftp: loaded support on port[0] = 21 [ 1738.419892] chnl_net:caif_netlink_parms(): no params data found [ 1738.455777] bridge0: port 1(bridge_slave_0) entered blocking state [ 1738.462417] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.469900] device bridge_slave_0 entered promiscuous mode [ 1738.477582] bridge0: port 2(bridge_slave_1) entered blocking state [ 1738.484290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.491663] device bridge_slave_1 entered promiscuous mode [ 1738.511909] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1738.521360] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1738.540843] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1738.548659] team0: Port device team_slave_0 added [ 1738.554298] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1738.561985] team0: Port device team_slave_1 added [ 1738.567345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1738.575022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1738.628105] device hsr_slave_0 entered promiscuous mode [ 1738.664643] device hsr_slave_1 entered promiscuous mode [ 1738.705018] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1738.712467] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1738.728999] bridge0: port 2(bridge_slave_1) entered blocking state [ 1738.735592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1738.742606] bridge0: port 1(bridge_slave_0) entered blocking state [ 1738.749118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1738.789260] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1738.796022] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1738.805585] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1738.815355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1738.823110] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.830226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.838834] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1738.856598] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1738.862805] 8021q: adding VLAN 0 to HW filter on device team0 [ 1738.872809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1738.880903] bridge0: port 1(bridge_slave_0) entered blocking state [ 1738.887398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1738.899522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1738.908113] bridge0: port 2(bridge_slave_1) entered blocking state [ 1738.914627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1738.932639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1738.940867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1738.951755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1738.966763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1738.981380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1738.991972] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1738.998553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1739.013640] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1739.026706] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:15 executing program 1: syz_execute_func(&(0x7f0000000dc0)="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") syz_execute_func(&(0x7f00000000c0)="c4e379614832074a2be92cc3980f053ef3aec4a37bf0c50141e2e922eb66d995f2144006460f0167abed80660f38463da16379637902000000f2d2dec4c2e99cfe00610061512e660f80000000813347420040311e2f16660f7f60d242a0eec5bf521784ae6b4cbec5c54d0f2c718f566beeee42319ebb70fe651c58a8271e664105ba1666460f6ca70288000066410f3a162888c423c96cb83d000000fe66410fd1e4269a0fdf43096bd104a8e1c4a27921f97cd8f3450fabe1c4213a5fc066420f383bd46767460f330000f43830ca30cac442fd21b19b0b0000ef02ddeac4c2901d6996c9e8e9362665e94612c8009ad089d38194d800002ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000dfaf82e440fdd0636b2aad9c741afa20f6baf00c4e39978c104c0414c598374fb0a070f00ac1e00000000ac699e0000000019821d46edc4037d092101f20f1dbe001000002e26417a7365970d22045c0b47cc474cf92f5c439b42a7a72856564401a9bb000042c4414974ecd53131fbc4a27508313bec") 04:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001ffcffffff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:15 executing program 5: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000200)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9459828218d00a30000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866dee4b6c1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d83004577cb0c0ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a299899999389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") 04:07:15 executing program 3: pause() syz_execute_func(&(0x7f00000003c0)="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") 04:07:15 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1739.355802] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000808000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:15 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:15 executing program 3: syz_execute_func(&(0x7f0000000a40)="4a2be966420f72f0f5980f0578f3aec4a37bf0c50341e2e926b5c9f34a0f38f60128218d00a30000262ff342906646da4e3292221322131dd919dec4c6c100dc55b1e6172525000e818f470fc980008080e2859ed23c788fe97c810f69e08f4cbec5c4c2858c3f8fc4a1c573d1f6c4613fc21d9053c7ab86c4213e5377000043d9497dbf8259438f34b267f36ab40f68803000000056f20f5161c366410ffe3a1687286c6c0ff341ab00fe8f08e4a25600b1355809580900000081660fdf53098f49609a567bc4c4617b708cfa00000000007466dee450c1f043fe02d134e146dec43b7d0f18e4e4e4f4260fe88c4200000000ca30cac4017a7fc3bb3cbb3c0209912af3430f47bb00000000000045dc0f845000f04781ae00100000f1000000c44258f313d800d800dd4805dfdf63a5b76e0b0ba17ae64295589cffffc3c4c27197a8820000004577cb0c0ce42ec4b1b57c1002020606b274c4410ff9720d838f09e89a5b00ddfafa485c835e2ec422e6c44115638b0c0000002cb18374fb0a07c40155f64e0666460fddc7eced36660f38058b97619236c421c96b82e2626320979747910002c1045c0b47cc47cc5c66420f1a436e2ef246e16d44800199bb00004242fbc9880c00c461b016a7df6900003422") syz_execute_func(&(0x7f0000000680)="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") [ 1739.523953] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000200000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:15 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1739.708985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1739.734401] net_ratelimit: 20 callbacks suppressed [ 1739.734411] protocol 88fb is buggy, dev hsr_slave_0 [ 1739.744714] protocol 88fb is buggy, dev hsr_slave_1 04:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000300000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1739.877940] device bridge_slave_1 left promiscuous mode [ 1739.897808] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.955590] device bridge_slave_0 left promiscuous mode [ 1739.961130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.054406] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.059533] protocol 88fb is buggy, dev hsr_slave_1 [ 1740.198825] device hsr_slave_1 left promiscuous mode [ 1740.214182] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.219370] protocol 88fb is buggy, dev hsr_slave_1 [ 1740.263344] device hsr_slave_0 left promiscuous mode [ 1740.294187] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.299370] protocol 88fb is buggy, dev hsr_slave_1 [ 1740.344922] team0 (unregistering): Port device team_slave_1 removed [ 1740.366989] team0 (unregistering): Port device team_slave_0 removed [ 1740.391945] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1740.438925] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1740.550771] bond0 (unregistering): Released all slaves [ 1740.580398] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1740.592457] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1740.934306] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.939489] protocol 88fb is buggy, dev hsr_slave_1 [ 1741.689611] IPVS: ftp: loaded support on port[0] = 21 [ 1741.764944] chnl_net:caif_netlink_parms(): no params data found [ 1741.812092] bridge0: port 1(bridge_slave_0) entered blocking state [ 1741.818907] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.826888] device bridge_slave_0 entered promiscuous mode [ 1741.835074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1741.841696] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.854683] device bridge_slave_1 entered promiscuous mode [ 1741.882140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1741.892426] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1741.913485] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1741.921226] team0: Port device team_slave_0 added [ 1741.927011] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1741.935733] team0: Port device team_slave_1 added [ 1741.941289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1741.949172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1742.017467] device hsr_slave_0 entered promiscuous mode [ 1742.055860] device hsr_slave_1 entered promiscuous mode [ 1742.106009] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1742.113214] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1742.129585] bridge0: port 2(bridge_slave_1) entered blocking state [ 1742.136033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1742.142777] bridge0: port 1(bridge_slave_0) entered blocking state [ 1742.149279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1742.185226] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1742.191334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1742.201188] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1742.210592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1742.219169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.226448] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.233687] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1742.244549] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1742.250647] 8021q: adding VLAN 0 to HW filter on device team0 [ 1742.262634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1742.272002] bridge0: port 1(bridge_slave_0) entered blocking state [ 1742.278392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1742.310192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1742.318236] bridge0: port 2(bridge_slave_1) entered blocking state [ 1742.324762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1742.332431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1742.340767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1742.349346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:07:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:18 executing program 3: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000001200)="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") 04:07:18 executing program 1: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d4") syz_execute_func(&(0x7f0000001640)="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") 04:07:18 executing program 5: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f00000002c0)="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") 04:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000400000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1742.357615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1742.366594] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1742.408390] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1742.418690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1742.454551] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:18 executing program 3: statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/167) syz_execute_func(&(0x7f0000000180)="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") 04:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000500000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1742.503065] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 04:07:18 executing program 5: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000ac0)="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") [ 1742.551521] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000600000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1742.666926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1742.837236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000700000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:19 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x10000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1743.041062] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000a00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1743.280822] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1743.635064] device bridge_slave_1 left promiscuous mode [ 1743.640831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.695880] device bridge_slave_0 left promiscuous mode [ 1743.701447] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.818180] device hsr_slave_1 left promiscuous mode [ 1743.858537] device hsr_slave_0 left promiscuous mode [ 1743.910528] team0 (unregistering): Port device team_slave_1 removed [ 1743.921090] team0 (unregistering): Port device team_slave_0 removed [ 1743.931940] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1743.971716] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1744.038655] bond0 (unregistering): Released all slaves [ 1745.094238] net_ratelimit: 26 callbacks suppressed [ 1745.094244] protocol 88fb is buggy, dev hsr_slave_0 [ 1745.104441] protocol 88fb is buggy, dev hsr_slave_1 04:07:21 executing program 1: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") 04:07:21 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3f000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000f00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:21 executing program 5: syz_execute_func(&(0x7f0000000e00)="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") r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 04:07:21 executing program 3: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000400)="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") [ 1745.515322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:21 executing program 1: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000cc0)="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") 04:07:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f002800000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1745.688204] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f004800000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:21 executing program 1: syz_genetlink_get_family_id$tipc(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000ac0)="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") [ 1745.878063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f004c00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1745.974190] protocol 88fb is buggy, dev hsr_slave_0 [ 1745.979404] protocol 88fb is buggy, dev hsr_slave_1 [ 1746.064697] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f006000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f006800000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1746.234659] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1746.305454] protocol 88fb is buggy, dev hsr_slave_0 [ 1746.310742] protocol 88fb is buggy, dev hsr_slave_1 [ 1746.352466] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1746.454237] protocol 88fb is buggy, dev hsr_slave_0 [ 1746.459389] protocol 88fb is buggy, dev hsr_slave_1 [ 1746.534251] protocol 88fb is buggy, dev hsr_slave_0 [ 1746.539421] protocol 88fb is buggy, dev hsr_slave_1 [ 1747.378789] IPVS: ftp: loaded support on port[0] = 21 [ 1747.463052] chnl_net:caif_netlink_parms(): no params data found [ 1747.504218] bridge0: port 1(bridge_slave_0) entered blocking state [ 1747.511399] bridge0: port 1(bridge_slave_0) entered disabled state [ 1747.518560] device bridge_slave_0 entered promiscuous mode [ 1747.526452] bridge0: port 2(bridge_slave_1) entered blocking state [ 1747.532921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1747.540109] device bridge_slave_1 entered promiscuous mode [ 1747.557822] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1747.567190] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1747.585084] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1747.592464] team0: Port device team_slave_0 added [ 1747.598517] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1747.606102] team0: Port device team_slave_1 added [ 1747.611575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1747.619347] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1747.706292] device hsr_slave_0 entered promiscuous mode [ 1747.764448] device hsr_slave_1 entered promiscuous mode [ 1747.804739] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1747.811821] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1747.829827] bridge0: port 2(bridge_slave_1) entered blocking state [ 1747.836293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1747.842919] bridge0: port 1(bridge_slave_0) entered blocking state [ 1747.853985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1747.893249] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1747.899857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1747.908393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1747.921455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1747.929155] bridge0: port 1(bridge_slave_0) entered disabled state [ 1747.936354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1747.943512] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1747.956444] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1747.962677] 8021q: adding VLAN 0 to HW filter on device team0 [ 1747.973363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1747.981519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1747.988463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1748.015536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1748.023475] bridge0: port 2(bridge_slave_1) entered blocking state [ 1748.029992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1748.039069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1748.047470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1748.056284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1748.068801] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1748.078944] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1748.089386] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1748.096703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1748.105354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1748.113099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1748.129028] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1748.141872] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:24 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x40000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f006c00000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:24 executing program 5: pause() syz_execute_func(&(0x7f0000000500)="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") 04:07:24 executing program 3: syz_execute_func(&(0x7f00000000c0)="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") 04:07:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:24 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x46000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000d40)='\x00\xaf1\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400000000400) fcntl$lock(r2, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) dup3(r1, r2, 0x0) 04:07:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00003f000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:37 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_virtio(&(0x7f0000000000)='selinuxvmnet1vboxnet1!\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 04:07:37 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6b6b6b00, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:37 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1761.232884] 9pnet_virtio: no channels available for device selinuxvmnet1vboxnet1! 04:07:37 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000440)='y\x00', 0x2, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000180)='security.selinux\x00', 0x0, 0x0, 0x2) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={'syz_tun\x00', {0x2, 0x4e22, @empty}}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 04:07:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f00000002c0)="39000000140081ae00002c000500018701b40b7a12fc84546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c", 0x39}], 0x1}, 0x0) [ 1761.286988] 9pnet_virtio: no channels available for device selinuxvmnet1vboxnet1! [ 1761.314499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000048000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:37 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x71000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) [ 1761.504698] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1761.715229] device bridge_slave_1 left promiscuous mode [ 1761.720804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1761.785189] device bridge_slave_0 left promiscuous mode [ 1761.790707] bridge0: port 1(bridge_slave_0) entered disabled state [ 1761.972203] device hsr_slave_1 left promiscuous mode [ 1762.029184] device hsr_slave_0 left promiscuous mode [ 1762.089811] team0 (unregistering): Port device team_slave_1 removed [ 1762.111028] team0 (unregistering): Port device team_slave_0 removed [ 1762.131214] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1762.208686] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1762.281688] bond0 (unregistering): Released all slaves [ 1763.312670] IPVS: ftp: loaded support on port[0] = 21 [ 1763.420460] chnl_net:caif_netlink_parms(): no params data found [ 1763.461757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1763.468286] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.476019] device bridge_slave_0 entered promiscuous mode [ 1763.486007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1763.492484] bridge0: port 2(bridge_slave_1) entered disabled state [ 1763.500685] device bridge_slave_1 entered promiscuous mode [ 1763.522512] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1763.532415] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1763.553892] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1763.561736] team0: Port device team_slave_0 added [ 1763.567901] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1763.581705] team0: Port device team_slave_1 added [ 1763.587429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1763.601173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1763.657892] device hsr_slave_0 entered promiscuous mode [ 1763.694627] device hsr_slave_1 entered promiscuous mode [ 1763.734902] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1763.742059] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1763.770823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1763.777289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1763.783992] bridge0: port 1(bridge_slave_0) entered blocking state [ 1763.790454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1763.855324] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1763.861615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1763.872444] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1763.882137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1763.889543] bridge0: port 1(bridge_slave_0) entered disabled state [ 1763.896871] bridge0: port 2(bridge_slave_1) entered disabled state [ 1763.906091] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1763.919205] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1763.927156] 8021q: adding VLAN 0 to HW filter on device team0 [ 1763.939435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1763.948509] bridge0: port 1(bridge_slave_0) entered blocking state [ 1763.954950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1763.971615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1763.979883] bridge0: port 2(bridge_slave_1) entered blocking state [ 1763.986478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1764.006240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1764.014709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1764.022546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1764.031240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1764.046103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1764.058579] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1764.068044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1764.085228] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1764.097599] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:40 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:07:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) gettid() io_destroy(0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x2000005) 04:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00004c000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:40 executing program 5: r0 = getpid() futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 04:07:40 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x74000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1764.341499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000060000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:40 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:07:40 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1764.579209] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:40 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@empty, @broadcast, [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty}, @icmp=@address_request}}}}, 0x0) 04:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f001460000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:40 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe4ffffff, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1764.948042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1765.075216] device bridge_slave_1 left promiscuous mode [ 1765.080791] bridge0: port 2(bridge_slave_1) entered disabled state [ 1765.155862] device bridge_slave_0 left promiscuous mode [ 1765.163053] bridge0: port 1(bridge_slave_0) entered disabled state [ 1765.378724] device hsr_slave_1 left promiscuous mode [ 1765.440989] device hsr_slave_0 left promiscuous mode [ 1765.504720] team0 (unregistering): Port device team_slave_1 removed [ 1765.540122] team0 (unregistering): Port device team_slave_0 removed [ 1765.559455] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1765.629099] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1765.718980] bond0 (unregistering): Released all slaves [ 1765.894242] net_ratelimit: 34 callbacks suppressed [ 1765.894252] protocol 88fb is buggy, dev hsr_slave_0 [ 1765.904686] protocol 88fb is buggy, dev hsr_slave_1 [ 1766.774191] protocol 88fb is buggy, dev hsr_slave_0 [ 1766.779415] protocol 88fb is buggy, dev hsr_slave_1 [ 1766.787947] IPVS: ftp: loaded support on port[0] = 21 [ 1766.872600] chnl_net:caif_netlink_parms(): no params data found [ 1766.940678] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.948466] bridge0: port 1(bridge_slave_0) entered disabled state [ 1766.961993] device bridge_slave_0 entered promiscuous mode [ 1766.971114] bridge0: port 2(bridge_slave_1) entered blocking state [ 1766.982763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1766.990651] device bridge_slave_1 entered promiscuous mode [ 1767.009940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1767.019106] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1767.039339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1767.047015] team0: Port device team_slave_0 added [ 1767.052921] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1767.061219] team0: Port device team_slave_1 added [ 1767.066788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1767.074577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1767.094245] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.099379] protocol 88fb is buggy, dev hsr_slave_1 [ 1767.166404] device hsr_slave_0 entered promiscuous mode [ 1767.234599] device hsr_slave_1 entered promiscuous mode [ 1767.254219] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.259324] protocol 88fb is buggy, dev hsr_slave_1 [ 1767.265560] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1767.272911] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1767.287592] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.294207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1767.300952] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.307572] bridge0: port 1(bridge_slave_0) entered forwarding state 04:07:43 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x10000) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x2000, 0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:07:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000068000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000000680)="65c98ddaaece527eb6fa0488bd29115dd10013aeaa07b700b461d9ae393ffc8ed9759fb154a4d3b5", 0x28}], 0x1}}], 0x1, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) 04:07:43 executing program 5: [ 1767.334228] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.339594] protocol 88fb is buggy, dev hsr_slave_1 [ 1767.365275] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1767.371390] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1767.398012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1767.414875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1767.426761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.440654] bridge0: port 2(bridge_slave_1) entered disabled state 04:07:43 executing program 5: [ 1767.536704] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1767.570609] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1767.609419] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1767.634714] 8021q: adding VLAN 0 to HW filter on device team0 04:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00006c000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1767.675933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:07:43 executing program 5: [ 1767.734523] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.740940] bridge0: port 1(bridge_slave_0) entered forwarding state 04:07:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e41853167377400000100000000004300170000e4db080087e90104000000001200000000000000001b2300000503000018030000cc000000ac0100000000ed001004d1e090e1fe916dd282e0f34f8dfac0dc1695977996"], 0x1) [ 1767.830890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:44 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) [ 1767.882833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1767.914991] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.921408] bridge0: port 2(bridge_slave_1) entered forwarding state 04:07:44 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$getsig(0x4202, r1, 0x0, 0x0) [ 1767.985410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1768.012828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1768.029384] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1768.040635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1768.050155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1768.061823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1768.070012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1768.081485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1768.101643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1768.110106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1768.123087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1768.133638] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1768.141150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1768.191494] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1768.210394] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:44 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xf2980800, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:44 executing program 1: 04:07:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000074000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1768.557534] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1768.581650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1769.155276] device bridge_slave_1 left promiscuous mode [ 1769.161065] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.205265] device bridge_slave_0 left promiscuous mode [ 1769.210847] bridge0: port 1(bridge_slave_0) entered disabled state [ 1769.337592] device hsr_slave_1 left promiscuous mode [ 1769.378299] device hsr_slave_0 left promiscuous mode [ 1769.418447] team0 (unregistering): Port device team_slave_1 removed [ 1769.431380] team0 (unregistering): Port device team_slave_0 removed [ 1769.441862] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1769.500386] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1769.588842] bond0 (unregistering): Released all slaves 04:07:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:46 executing program 3: 04:07:46 executing program 5: 04:07:46 executing program 1: 04:07:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00007a000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:46 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xff000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1770.616258] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:46 executing program 5: [ 1770.664723] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:46 executing program 3: 04:07:46 executing program 1: 04:07:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00fe80000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:46 executing program 5: [ 1770.871751] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:47 executing program 3: [ 1770.934192] net_ratelimit: 20 callbacks suppressed [ 1770.934201] protocol 88fb is buggy, dev hsr_slave_0 [ 1770.944886] protocol 88fb is buggy, dev hsr_slave_1 [ 1771.254189] protocol 88fb is buggy, dev hsr_slave_0 [ 1771.259346] protocol 88fb is buggy, dev hsr_slave_1 [ 1771.414187] protocol 88fb is buggy, dev hsr_slave_0 [ 1771.419319] protocol 88fb is buggy, dev hsr_slave_1 [ 1771.494281] protocol 88fb is buggy, dev hsr_slave_0 [ 1771.499626] protocol 88fb is buggy, dev hsr_slave_1 [ 1772.134173] protocol 88fb is buggy, dev hsr_slave_0 [ 1772.139417] protocol 88fb is buggy, dev hsr_slave_1 [ 1772.604994] IPVS: ftp: loaded support on port[0] = 21 [ 1772.680143] chnl_net:caif_netlink_parms(): no params data found [ 1772.713743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1772.720268] bridge0: port 1(bridge_slave_0) entered disabled state [ 1772.727428] device bridge_slave_0 entered promiscuous mode [ 1772.734616] bridge0: port 2(bridge_slave_1) entered blocking state [ 1772.741027] bridge0: port 2(bridge_slave_1) entered disabled state [ 1772.748161] device bridge_slave_1 entered promiscuous mode [ 1772.767617] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1772.777674] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1772.794638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1772.803039] team0: Port device team_slave_0 added [ 1772.808761] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1772.816645] team0: Port device team_slave_1 added [ 1772.821984] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1772.829425] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1772.897791] device hsr_slave_0 entered promiscuous mode [ 1772.934667] device hsr_slave_1 entered promiscuous mode [ 1772.974882] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1772.982208] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1772.998171] bridge0: port 2(bridge_slave_1) entered blocking state [ 1773.004773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1773.011585] bridge0: port 1(bridge_slave_0) entered blocking state [ 1773.018402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1773.057692] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1773.063837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1773.072435] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1773.081669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1773.089895] bridge0: port 1(bridge_slave_0) entered disabled state [ 1773.096759] bridge0: port 2(bridge_slave_1) entered disabled state [ 1773.103921] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1773.115543] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1773.121812] 8021q: adding VLAN 0 to HW filter on device team0 [ 1773.131340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1773.140013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1773.146424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1773.158900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1773.166953] bridge0: port 2(bridge_slave_1) entered blocking state [ 1773.173524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1773.191055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1773.199438] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1773.211280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1773.225911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1773.238530] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1773.249175] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1773.255415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1773.262803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1773.280393] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1773.292240] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:49 executing program 1: 04:07:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000081000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:49 executing program 5: 04:07:49 executing program 3: 04:07:49 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xffff8000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:49 executing program 5: 04:07:49 executing program 1: [ 1773.802743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:49 executing program 3: 04:07:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00fec0000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:50 executing program 5: 04:07:50 executing program 3: [ 1774.081187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1774.172752] device bridge_slave_1 left promiscuous mode [ 1774.183592] bridge0: port 2(bridge_slave_1) entered disabled state [ 1774.257344] device bridge_slave_0 left promiscuous mode [ 1774.272459] bridge0: port 1(bridge_slave_0) entered disabled state [ 1774.516982] device hsr_slave_1 left promiscuous mode [ 1774.573619] device hsr_slave_0 left promiscuous mode [ 1774.629162] team0 (unregistering): Port device team_slave_1 removed [ 1774.641289] team0 (unregistering): Port device team_slave_0 removed [ 1774.652517] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1774.710524] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1774.778169] bond0 (unregistering): Released all slaves [ 1775.813405] IPVS: ftp: loaded support on port[0] = 21 [ 1775.901203] chnl_net:caif_netlink_parms(): no params data found [ 1775.962884] bridge0: port 1(bridge_slave_0) entered blocking state [ 1775.970352] bridge0: port 1(bridge_slave_0) entered disabled state [ 1775.980010] device bridge_slave_0 entered promiscuous mode [ 1775.987909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1775.995244] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.003420] device bridge_slave_1 entered promiscuous mode [ 1776.028508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1776.039156] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1776.058947] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1776.067076] team0: Port device team_slave_0 added [ 1776.073013] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1776.080902] team0: Port device team_slave_1 added [ 1776.086757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1776.094498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1776.157959] device hsr_slave_0 entered promiscuous mode [ 1776.194721] device hsr_slave_1 entered promiscuous mode [ 1776.244891] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1776.252070] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1776.267904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.274345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1776.281153] bridge0: port 1(bridge_slave_0) entered blocking state [ 1776.287584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1776.294267] net_ratelimit: 26 callbacks suppressed [ 1776.294276] protocol 88fb is buggy, dev hsr_slave_0 [ 1776.304648] protocol 88fb is buggy, dev hsr_slave_1 [ 1776.333799] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1776.340674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1776.349900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1776.360506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1776.368008] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.375680] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.385998] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1776.398449] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1776.405223] 8021q: adding VLAN 0 to HW filter on device team0 [ 1776.415740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1776.423466] bridge0: port 1(bridge_slave_0) entered blocking state [ 1776.429866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1776.447818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1776.456071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.463570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1776.485888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1776.493780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1776.502612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1776.510217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1776.519636] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1776.526369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1776.534270] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1776.552496] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1776.564651] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1776.634216] protocol 88fb is buggy, dev hsr_slave_0 [ 1776.640035] protocol 88fb is buggy, dev hsr_slave_1 [ 1776.754289] protocol 88fb is buggy, dev hsr_slave_0 [ 1776.759559] protocol 88fb is buggy, dev hsr_slave_1 04:07:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:52 executing program 1: 04:07:52 executing program 5: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000001cc0)="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") 04:07:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000f0000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:52 executing program 3: syz_execute_func(&(0x7f0000000240)="9877774a2ae92cb81c050f05bffa254000c4a37bf0c55c40e2e9c8c8363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000a80)="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") 04:07:52 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffe4, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1776.874193] protocol 88fb is buggy, dev hsr_slave_0 [ 1776.879325] protocol 88fb is buggy, dev hsr_slave_1 [ 1776.910627] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:53 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:53 executing program 1: pause() syz_execute_func(&(0x7f0000000740)="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") 04:07:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000fc000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1776.994201] protocol 88fb is buggy, dev hsr_slave_0 [ 1776.999562] protocol 88fb is buggy, dev hsr_slave_1 04:07:53 executing program 3: pause() syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000a40)="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") lsetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000080)=',@-(\x00', 0x5, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 1777.137593] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:53 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x10000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0080fe000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1777.309028] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1777.405416] device bridge_slave_1 left promiscuous mode [ 1777.411740] bridge0: port 2(bridge_slave_1) entered disabled state [ 1777.465599] device bridge_slave_0 left promiscuous mode [ 1777.476246] bridge0: port 1(bridge_slave_0) entered disabled state [ 1777.667542] device hsr_slave_1 left promiscuous mode [ 1777.719723] device hsr_slave_0 left promiscuous mode [ 1777.775338] team0 (unregistering): Port device team_slave_1 removed [ 1777.799672] team0 (unregistering): Port device team_slave_0 removed [ 1777.822405] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1777.891100] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1778.033449] bond0 (unregistering): Released all slaves [ 1779.143734] IPVS: ftp: loaded support on port[0] = 21 [ 1779.252244] chnl_net:caif_netlink_parms(): no params data found [ 1779.314898] bridge0: port 1(bridge_slave_0) entered blocking state [ 1779.321459] bridge0: port 1(bridge_slave_0) entered disabled state [ 1779.329170] device bridge_slave_0 entered promiscuous mode [ 1779.337135] bridge0: port 2(bridge_slave_1) entered blocking state [ 1779.344267] bridge0: port 2(bridge_slave_1) entered disabled state [ 1779.351423] device bridge_slave_1 entered promiscuous mode [ 1779.379609] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1779.389706] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1779.423355] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1779.432485] team0: Port device team_slave_0 added [ 1779.443818] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1779.453058] team0: Port device team_slave_1 added [ 1779.458897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1779.469038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1779.528059] device hsr_slave_0 entered promiscuous mode [ 1779.564496] device hsr_slave_1 entered promiscuous mode [ 1779.624980] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1779.632406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1779.647125] bridge0: port 2(bridge_slave_1) entered blocking state [ 1779.653845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1779.660730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1779.667155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1779.707563] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1779.713660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1779.723041] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1779.733206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1779.741127] bridge0: port 1(bridge_slave_0) entered disabled state [ 1779.748404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1779.756655] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1779.769696] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1779.776533] 8021q: adding VLAN 0 to HW filter on device team0 [ 1779.786425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1779.794407] bridge0: port 1(bridge_slave_0) entered blocking state [ 1779.801004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1779.819748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1779.828354] bridge0: port 2(bridge_slave_1) entered blocking state [ 1779.834774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1779.855618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1779.863654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1779.872216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1779.880201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1779.888785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1779.899621] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1779.905986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1779.919421] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1779.934248] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00c0fe000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:56 executing program 3: syz_execute_func(&(0x7f0000000b80)="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") syz_open_dev$rtc(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c945903835a48d00b300262ff342906646dae54e32bc32bc6379637902000000dec41455b3e61763632525000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff50c4e1ff701e00660fdf53098f69609b5687e8e17474d8d8a1de2ad764dff2c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1f2af32eaf00002665e94612b6c82e410f8cee0000000000d0818194d8004451de88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c801905440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374fb0a07c401f1eb2745defaeecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc4c441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae50240f4401a9bb000042c4414974ec0b31c4617ddd880c00000023") 04:07:56 executing program 5: syz_execute_func(&(0x7f0000000140)="9877774a2ae92cb81c050f05bffa254000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="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") 04:07:56 executing program 1: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f00000002c0)="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") [ 1780.046418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000ff000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1780.281827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000c08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:56 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x40000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1780.485219] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000001108000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000002508000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1780.610851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1780.629299] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:56 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6b6b6b00000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:07:56 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x80ffff00000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1780.783390] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1781.137815] device bridge_slave_1 left promiscuous mode [ 1781.143604] bridge0: port 2(bridge_slave_1) entered disabled state [ 1781.215256] device bridge_slave_0 left promiscuous mode [ 1781.227523] bridge0: port 1(bridge_slave_0) entered disabled state [ 1781.334263] net_ratelimit: 28 callbacks suppressed [ 1781.334272] protocol 88fb is buggy, dev hsr_slave_0 [ 1781.344397] protocol 88fb is buggy, dev hsr_slave_1 [ 1781.437653] device hsr_slave_1 left promiscuous mode [ 1781.488245] device hsr_slave_0 left promiscuous mode [ 1781.548993] team0 (unregistering): Port device team_slave_1 removed [ 1781.559499] team0 (unregistering): Port device team_slave_0 removed [ 1781.571487] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1781.617924] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1781.654231] protocol 88fb is buggy, dev hsr_slave_0 [ 1781.660124] protocol 88fb is buggy, dev hsr_slave_1 [ 1781.705551] bond0 (unregistering): Released all slaves [ 1781.824215] protocol 88fb is buggy, dev hsr_slave_0 [ 1781.829381] protocol 88fb is buggy, dev hsr_slave_1 [ 1781.894210] protocol 88fb is buggy, dev hsr_slave_0 [ 1781.899569] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.534247] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.539748] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.574301] IPVS: ftp: loaded support on port[0] = 21 [ 1782.786569] chnl_net:caif_netlink_parms(): no params data found [ 1782.861631] bridge0: port 1(bridge_slave_0) entered blocking state [ 1782.868185] bridge0: port 1(bridge_slave_0) entered disabled state [ 1782.875623] device bridge_slave_0 entered promiscuous mode [ 1782.882735] bridge0: port 2(bridge_slave_1) entered blocking state [ 1782.889341] bridge0: port 2(bridge_slave_1) entered disabled state [ 1782.896974] device bridge_slave_1 entered promiscuous mode [ 1782.918926] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1782.928894] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1782.950177] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1782.957975] team0: Port device team_slave_0 added [ 1782.969340] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1782.977172] team0: Port device team_slave_1 added [ 1782.982682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1782.990514] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 04:07:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:07:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000005f08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:07:59 executing program 1: syz_execute_func(&(0x7f0000000000)="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") syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae54e32bc32bc6379637902000000de911455b3e6c402c53b14e863632525000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700f0438f34b267f36ab40f68803000000054470f18d166410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1f2af32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374fb0a07c401f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999964450fa574e400c4c2b9ae50240f4401faa9bb00004242414974ec0b31c4617ddd880c00000023") 04:07:59 executing program 5: syz_execute_func(0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x40602) syz_execute_func(&(0x7f00000008c0)="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") 04:07:59 executing program 3: syz_execute_func(&(0x7f00000008c0)="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") [ 1783.048858] device hsr_slave_0 entered promiscuous mode [ 1783.084693] device hsr_slave_1 entered promiscuous mode [ 1783.132941] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1783.144842] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1783.191513] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1783.238307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1783.244849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1783.251550] bridge0: port 1(bridge_slave_0) entered blocking state [ 1783.258077] bridge0: port 1(bridge_slave_0) entered forwarding state 04:07:59 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000007c0)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae54e32bc32bc6379637902000000de911455b3e61763632525000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1fc422b5bd0a2eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4f42d92f9f928c4a17ae64295f20f79fac4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374fb0a07c401f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae50240f4401faa9bb00004242414974ec0b31c4617ddd880c00000023") 04:07:59 executing program 1: pause() syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000b80)="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") 04:07:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00000ee07208000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1783.532982] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1783.554759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1783.567487] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:07:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000008108000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1783.584680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1783.611030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1783.622689] bridge0: port 1(bridge_slave_0) entered disabled state [ 1783.635913] bridge0: port 2(bridge_slave_1) entered disabled state [ 1783.650839] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1783.671900] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1783.681620] 8021q: adding VLAN 0 to HW filter on device team0 [ 1783.706573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1783.720487] bridge0: port 1(bridge_slave_0) entered blocking state [ 1783.727009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1783.760949] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1783.787780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1783.801425] bridge0: port 2(bridge_slave_1) entered blocking state [ 1783.807965] bridge0: port 2(bridge_slave_1) entered forwarding state 04:07:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000048208000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1783.843231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1783.851394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1783.869913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1783.882088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1783.891255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1783.902266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1783.909737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1783.922149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1783.938561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1783.953494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1783.971412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1783.989806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1784.006971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1784.015133] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1784.025993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 04:08:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000002000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1784.043342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1784.058282] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1784.071791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1784.105311] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1784.149501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1784.165760] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1784.188714] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:00 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x100000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1785.054753] device bridge_slave_1 left promiscuous mode [ 1785.060401] bridge0: port 2(bridge_slave_1) entered disabled state [ 1785.134944] device bridge_slave_0 left promiscuous mode [ 1785.140595] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.261679] device hsr_slave_1 left promiscuous mode [ 1785.327926] device hsr_slave_0 left promiscuous mode [ 1785.380252] team0 (unregistering): Port device team_slave_1 removed [ 1785.391511] team0 (unregistering): Port device team_slave_0 removed [ 1785.401957] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1785.429670] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1785.518208] bond0 (unregistering): Released all slaves 04:08:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:02 executing program 3: pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000b80)="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") syz_open_dev$rtc(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="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") 04:08:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000003000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:02 executing program 5: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f00000004c0)="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") pipe2(0x0, 0x0) 04:08:02 executing program 1: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000007c0)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae54e32bc32bc6379637902000000de911455b3e6c402c53b14e863632525000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700f0438f34b267f36ab40f68803000000054470f18d166410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1f2af32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374fb0a07c401f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999964450fa574e400c4c2b9ae50240f4401faa9bb00004242414974ec0b31c4617ddd880c00000023") 04:08:02 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x200000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1786.264025] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000004000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:02 executing program 1: syz_execute_func(&(0x7f0000000880)="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") syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000780)="c4e379614832074a2be92cbd980f053ef3aec4a37bf0c50141e2e922eb66d995f2144006262fed80660f38463da16379638fa97c8023000000f2d2dec4427921510b0061007eea518f29f09780992c1dd2fa3ce1491e2f16c2e54cc54cbec5c54d0f2c718f566beeee42319ebb70fe6581f0430fc0b2c4c2999793090000001c58660f38402dd16e00001e4105ba36f2ae66410f3a16288866410fd1e426660fdf53096bd104a8e1430fae27c4a27921f97cd8c4213a5fc066420f383bd46767460f330000f4835a00053830ca30cac442fd21b19b0b0000ef00ddeac4c2801d9c96c9e8e9362665e94612c8009aeed0818107d800002ddd8f0b00c4a17ae642958f49c09597f1ffffffffd29efbfb36646466264683b9080000000d34f82e440fdd06d92a41afa20f6baf00c4e39978c1d4c0414c73595974fb0a070f00ac1e00000000accd58edc4037d092101669dc40145d47e3636f765979722045c0b47cc474cf92f5c65002d08000000439b42a7a72856564401a9bb00004265f045836fb400d53131fbc4a27508313bec") 04:08:02 executing program 3: syz_execute_func(&(0x7f0000000b80)="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") syz_execute_func(&(0x7f0000000000)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c945903835a48d00b300262ff342906646dae54e32bc32bc6379637902000000dec41455b3e62563632525000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536c401fb704dff03500909660fdf53098f69609b5687e8e17474d8d8a1de2ad764dff2c4a23a5fc0660f38de8e85e13b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1f2af32eaf00002665e94612b6c82e410f8cee0000000000d0818194d8004451de88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374fb0a07c401f1eb2745defaeecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc4c441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae50240f4401a9bb000042c4414974ec0b31c4617ddd880c00000023") [ 1786.511196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000005000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:02 executing program 1: syz_execute_func(&(0x7f0000000140)="9877774a2ae92cb81c050f05bffa254000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000400)="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") [ 1786.694234] net_ratelimit: 26 callbacks suppressed [ 1786.694244] protocol 88fb is buggy, dev hsr_slave_0 [ 1786.704636] protocol 88fb is buggy, dev hsr_slave_1 [ 1786.768412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000006000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1786.972034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1787.574237] protocol 88fb is buggy, dev hsr_slave_0 [ 1787.579435] protocol 88fb is buggy, dev hsr_slave_1 [ 1787.894220] protocol 88fb is buggy, dev hsr_slave_0 [ 1787.899579] protocol 88fb is buggy, dev hsr_slave_1 [ 1788.054195] protocol 88fb is buggy, dev hsr_slave_0 [ 1788.059327] protocol 88fb is buggy, dev hsr_slave_1 [ 1788.134194] protocol 88fb is buggy, dev hsr_slave_0 [ 1788.139832] protocol 88fb is buggy, dev hsr_slave_1 [ 1788.836903] IPVS: ftp: loaded support on port[0] = 21 [ 1788.906456] chnl_net:caif_netlink_parms(): no params data found [ 1788.945827] bridge0: port 1(bridge_slave_0) entered blocking state [ 1788.952253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1788.959660] device bridge_slave_0 entered promiscuous mode [ 1788.967371] bridge0: port 2(bridge_slave_1) entered blocking state [ 1788.973788] bridge0: port 2(bridge_slave_1) entered disabled state [ 1788.981007] device bridge_slave_1 entered promiscuous mode [ 1788.998320] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1789.007988] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1789.024698] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1789.032235] team0: Port device team_slave_0 added [ 1789.038129] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1789.045861] team0: Port device team_slave_1 added [ 1789.051335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1789.058990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1789.146688] device hsr_slave_0 entered promiscuous mode [ 1789.204399] device hsr_slave_1 entered promiscuous mode [ 1789.244823] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1789.252108] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1789.269611] bridge0: port 2(bridge_slave_1) entered blocking state [ 1789.276123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1789.282766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1789.289181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1789.330378] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1789.337623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1789.349026] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1789.358818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1789.366317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1789.373285] bridge0: port 2(bridge_slave_1) entered disabled state 04:08:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:05 executing program 5: syz_execute_func(&(0x7f0000000b80)="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") syz_open_dev$rtc(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 04:08:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000007000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:05 executing program 3: syz_execute_func(&(0x7f00000001c0)="f3400f2c304a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff34290460f71d31c7902000000de911455b3e617634c63e2e2000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700f0438f34b267f36ab40f6880300000005666f0010d0000000066410f3a1628880000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1ff2470f01c32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4d4c46185faa799f50000c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374d0fb0a0707c4a1f8100aeb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae5024faa9bb00004236f244aa0b31c4617ddd880c00000023") 04:08:05 executing program 1: syz_execute_func(&(0x7f0000000580)="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") [ 1789.381628] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1789.422612] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1789.433833] 8021q: adding VLAN 0 to HW filter on device team0 [ 1789.450389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1789.462379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1789.469002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1789.534778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1789.551952] bridge0: port 2(bridge_slave_1) entered blocking state [ 1789.558604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1789.592137] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1789.619495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1789.645474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1789.672671] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1789.696548] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1789.712289] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1789.725110] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1789.732643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1789.756305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1789.780922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1789.791257] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1789.825594] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:06 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x300000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:06 executing program 1: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f00000000c0)="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") 04:08:06 executing program 5: pause() syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000040)="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") r0 = msgget$private(0x0, 0x10) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)=0x6) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) 04:08:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00000a000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00000f000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1790.117652] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000028000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1790.229009] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:06 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x400000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1790.363841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1790.704885] device bridge_slave_1 left promiscuous mode [ 1790.710689] bridge0: port 2(bridge_slave_1) entered disabled state [ 1790.785084] device bridge_slave_0 left promiscuous mode [ 1790.790662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1790.938147] device hsr_slave_1 left promiscuous mode [ 1791.008451] device hsr_slave_0 left promiscuous mode [ 1791.039729] team0 (unregistering): Port device team_slave_1 removed [ 1791.050301] team0 (unregistering): Port device team_slave_0 removed [ 1791.061267] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1791.109077] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1791.185587] bond0 (unregistering): Released all slaves [ 1791.734225] net_ratelimit: 20 callbacks suppressed [ 1791.734234] protocol 88fb is buggy, dev hsr_slave_0 [ 1791.744377] protocol 88fb is buggy, dev hsr_slave_1 [ 1792.054178] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.059498] protocol 88fb is buggy, dev hsr_slave_1 [ 1792.214199] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.219403] protocol 88fb is buggy, dev hsr_slave_1 [ 1792.294182] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.299497] protocol 88fb is buggy, dev hsr_slave_1 04:08:08 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x500000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:08 executing program 3: syz_execute_func(&(0x7f0000001cc0)="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") 04:08:08 executing program 1: syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866de6564f20fd6fdc1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9b9b0ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a299899999389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") 04:08:08 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c94590c4e2d593a47ef39900008d00a30000262ff342906646da4e3292a16379637902000000de021455b3e61763632525000e8182b00080008080e285660fe2830e000000491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68806241000057d85ced8e66410f3a162888f3af0000c4a171f593fe41ff5009098f69609b5687f30fae60008f0978e18de6315264c4e2292f6300c4a23a5fc0660f38de8e85e1f326470f5f103667f342df62d812fcc402d10472f8e39b3825ca30caab6abbd9c402219164f0470fab392af3420f2a52009f003e00008450007700d0818194d8004451ae88f4f4932d92fdf9a8a8a17ae64295c481c4591bc4a1ab7cb00080000045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0414c598374fb0a07c501f1ea27f247aceced36660f38058b976192360047910002c1045c0b47dc47ccaf268111a989000065002d08000000c4417913a299b58999995906c421fa2d4ec80f3701a9bb0000428e41eb74ec0b31660f383af73523") 04:08:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000048000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1792.578907] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:08 executing program 1: syz_execute_func(0x0) syz_execute_func(&(0x7f0000000400)="c4e379614832074a2be92c3e93980f053ef3aec4a37bf0c50141e2e922eb66d995f214400666440f383dbe080000001d660f38467902000000f2d2dec4613657b1b60000c4829d4654fa3700d54a8cd4d4201e2f16ae4cbec5c54d0f2c718f56eec442319ebb70fe65818f8868ec8e2cb6000004bab2585641564105ba16f2ae66410f3a162888c423c96cb83d000000fe66410fd1e426660fdf53098f69609bfb87a8e1430faecd477cd8d8a1a12ad764c421a83a5fc0c081ac5fe0643619ec8004f440646666413a0f3830828230ca400f38253d0300000067ddeac4c2f61d9c96c9e8e9362665e94612c8002e0feeced0818194d8000f0967450500000000c4a17ae64295c401977c4ffeffd2fb2e36646466264683b9080000000d5df82e440fdd0636b2aac4c4627d78410141afa28f6baf4900c6e3d699cb99cbc0414e591a8374fb0a070f633c0caccd58e52e660ffb09f20f1dbe0010000000e5c565978047910002c10b47ccf0ff03f92f5c65002d08000000439b42a7a75e8f098895eaa9bb000042d5f04721956500000066dbd1c4a27508313bec") 04:08:08 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000600)="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") 04:08:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00004c000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1792.849510] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000060000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1792.934335] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.939541] protocol 88fb is buggy, dev hsr_slave_1 [ 1793.069350] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000068000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1793.229195] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00006c000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1793.372741] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1794.773967] IPVS: ftp: loaded support on port[0] = 21 [ 1794.857254] chnl_net:caif_netlink_parms(): no params data found [ 1794.892406] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.899130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1794.906803] device bridge_slave_0 entered promiscuous mode [ 1794.914227] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.920672] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.928340] device bridge_slave_1 entered promiscuous mode [ 1794.948213] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1794.961165] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1794.982549] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1794.990287] team0: Port device team_slave_0 added [ 1794.996479] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1795.004264] team0: Port device team_slave_1 added [ 1795.009770] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1795.017356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1795.086637] device hsr_slave_0 entered promiscuous mode [ 1795.134509] device hsr_slave_1 entered promiscuous mode [ 1795.186276] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1795.193558] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1795.210644] bridge0: port 2(bridge_slave_1) entered blocking state [ 1795.217201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1795.224026] bridge0: port 1(bridge_slave_0) entered blocking state [ 1795.230527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1795.271725] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1795.278876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1795.290474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1795.301444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1795.308901] bridge0: port 1(bridge_slave_0) entered disabled state [ 1795.316483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1795.323758] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1795.342297] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1795.348610] 8021q: adding VLAN 0 to HW filter on device team0 [ 1795.361190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1795.369063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1795.377053] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1795.395929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1795.403841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1795.410464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1795.421035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1795.433634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1795.445054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1795.461793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1795.469481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1795.479272] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1795.485526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1795.502062] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1795.516396] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:11 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x600000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:11 executing program 3: pause() syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000040)="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") msgget$private(0x0, 0x10) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 04:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000074000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:11 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000100)="980f050520d0f80791b0164141e2e96564dab20000051b503b105b7f7f162f0fc4014e66f66d220fa0e5be34d1c4e1f8c4e56a0a0a0fae5c51d900006e67f3c78888a1c40fbbc4e201acac10000000808f294001b00b000000f08171a38a806ebb57c46291ae8ca0656000000f01422d96000000410f0d56e21f430142c405b18787b15ffbb15ffbc441e1e94cba9b0f3804830a000000") syz_execute_func(&(0x7f00000008c0)="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") 04:08:11 executing program 1: getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="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") 04:08:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) [ 1795.812682] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f00007a000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:12 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x700000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:12 executing program 1: syz_execute_func(&(0x7f0000000100)="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") 04:08:12 executing program 3: syz_execute_func(&(0x7f0000000340)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae54e32bc32bc6379637902000000de911455b3e617634c63e2e2000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f6880300000005666f0010d0000000066410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1ff2470f01c32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4f4c46185faa799f50000c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374d0fb0a070701f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae50240f4401faa9bb00004242414974bc0b31c4617ddd880c00000023") [ 1796.033947] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000f0000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:12 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa00000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:12 executing program 3: syz_execute_func(&(0x7f0000000e00)="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") [ 1796.251474] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000fc000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1796.513133] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1796.558523] device bridge_slave_1 left promiscuous mode [ 1796.574343] bridge0: port 2(bridge_slave_1) entered disabled state 04:08:12 executing program 5: syz_execute_func(&(0x7f0000000100)="980f050520d0f80791b0164141e2e96564dab20000051b503b105b7f7f162f0fc4014e66f66d220fa0e5be34d1c4e1f8c4e56a0a0a0fae5c51d900006e67f3c78888a1c40fbbc4e201acac10000000808f294001b00b000000f08171a38a806ebb57c46291ae8ca0656000000f01422d96000000410f0d56e21f430142c405b18787b15ffbb15ffbc441e1e94cba9b0f3804830a000000") syz_execute_func(&(0x7f00000008c0)="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") [ 1796.635271] device bridge_slave_0 left promiscuous mode [ 1796.641044] bridge0: port 1(bridge_slave_0) entered disabled state 04:08:13 executing program 1: syz_execute_func(&(0x7f0000000ac0)="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") [ 1796.917756] device hsr_slave_1 left promiscuous mode [ 1796.982699] device hsr_slave_0 left promiscuous mode [ 1797.039153] team0 (unregistering): Port device team_slave_1 removed [ 1797.094170] net_ratelimit: 26 callbacks suppressed [ 1797.094178] protocol 88fb is buggy, dev hsr_slave_0 [ 1797.104558] protocol 88fb is buggy, dev hsr_slave_1 [ 1797.110316] team0 (unregistering): Port device team_slave_0 removed [ 1797.161736] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1797.236621] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1797.471414] bond0 (unregistering): Released all slaves [ 1797.974225] protocol 88fb is buggy, dev hsr_slave_0 [ 1797.979358] protocol 88fb is buggy, dev hsr_slave_1 [ 1798.294220] protocol 88fb is buggy, dev hsr_slave_0 [ 1798.299738] protocol 88fb is buggy, dev hsr_slave_1 [ 1798.389867] IPVS: ftp: loaded support on port[0] = 21 [ 1798.454234] protocol 88fb is buggy, dev hsr_slave_0 [ 1798.459420] protocol 88fb is buggy, dev hsr_slave_1 [ 1798.534214] protocol 88fb is buggy, dev hsr_slave_0 [ 1798.539477] protocol 88fb is buggy, dev hsr_slave_1 [ 1798.551269] chnl_net:caif_netlink_parms(): no params data found [ 1798.620253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1798.632969] bridge0: port 1(bridge_slave_0) entered disabled state [ 1798.640708] device bridge_slave_0 entered promiscuous mode [ 1798.654473] bridge0: port 2(bridge_slave_1) entered blocking state [ 1798.661045] bridge0: port 2(bridge_slave_1) entered disabled state [ 1798.674836] device bridge_slave_1 entered promiscuous mode [ 1798.695677] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1798.710826] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:08:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:14 executing program 3: syz_execute_func(&(0x7f0000000ac0)="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") 04:08:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000030a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:14 executing program 5: pause() syz_execute_func(&(0x7f00000008c0)="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") 04:08:14 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) read(r2, &(0x7f00000001c0)=""/4096, 0x1000) [ 1798.738361] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1798.752134] team0: Port device team_slave_0 added [ 1798.758201] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1798.766143] team0: Port device team_slave_1 added [ 1798.771675] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1798.779356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1798.837510] device hsr_slave_0 entered promiscuous mode [ 1798.884590] device hsr_slave_1 entered promiscuous mode [ 1798.925036] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1798.957134] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:15 executing program 3: syz_execute_func(&(0x7f0000000e00)="c4e3f9614832072be966420f72f0f5980f05aec4a37bf0c50341e2e9c443156c82feefffff00f34a0f38f6142f2f218d00a30000262f44d2313f90c4611dd919d9b157000000c6c100dc55b1e6172525000e81420f29fbc44149e8a0008000008f6978d7569e80e2858fe9d093de7b8fe97c810f43f77589f08f09bec5c4c28566420f3837dbf28090765858266465460f9f8b1ce7561300d9c4c1a9ef5edb43d08a1e1200005959267a06c4c111faea614848410ffe3ac421ddeb4c870428ff2c0fbc7b1f000000fe8f08e4a25600b135580958090000666566410f382aaf6e073d93672ef30f51c965440f2cdfc4617b708cfa00000000008cd4664bab664bab50275027381ec18d8bfe400f0d50003667660f75f73b417d0f0f4fbd0d64f3e1bb00e4e4c481a9f285068000008c4200000000ca30c8bb3cbb3c0209912af343db0f0fbb00be53080000c422092f845015000000849200c44258f313d800d800dd8fc4618160ecf578d339390b0bf20bf267660f13617c95589cc4a3516a876e00000000cec3c422d93e98000000807c302df904b20035cb0c0ce416a17c100397a862b274c497850480004dcdcd378100080000ddc4c1f9fc0ec4e1add5bb5d5d0000485c7ec4ce2dc1064d064d040000c422e6912cb1c40155f64e0666460fddc79fed36660f38058b976192368f294801d1c481fd2f5a80509797910002c1045c0b47cc47cc5cc481bbd095000001002ef246e16d89004242c401f82e14dc2941eee8310e617ddd880c00e405f5c71606df6920") syz_open_dev$loop(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000880)="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") [ 1798.979350] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 04:08:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000050a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1799.020758] bridge0: port 2(bridge_slave_1) entered blocking state [ 1799.027403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1799.034363] bridge0: port 1(bridge_slave_0) entered blocking state [ 1799.040806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1799.155885] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1799.230187] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1799.257880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1799.281428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1799.308986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1799.330239] bridge0: port 1(bridge_slave_0) entered disabled state [ 1799.349004] bridge0: port 2(bridge_slave_1) entered disabled state [ 1799.361027] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1799.381608] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1799.389179] 8021q: adding VLAN 0 to HW filter on device team0 [ 1799.408024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1799.416247] bridge0: port 1(bridge_slave_0) entered blocking state [ 1799.422763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1799.435239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1799.443182] bridge0: port 2(bridge_slave_1) entered blocking state [ 1799.449674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1799.467831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1799.476344] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1799.494767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1799.505283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1799.517599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1799.527824] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1799.534038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1799.549136] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1799.562584] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:15 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:15 executing program 1: syz_execute_func(&(0x7f0000000080)="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") 04:08:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000060a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:15 executing program 3: pause() syz_execute_func(&(0x7f0000000200)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9459828218d00a30000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866dee4b6c1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d83004577cb0c0ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a299899999389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") 04:08:15 executing program 5: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000940)="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") [ 1799.825056] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1800.445512] device bridge_slave_1 left promiscuous mode [ 1800.451383] bridge0: port 2(bridge_slave_1) entered disabled state [ 1800.505174] device bridge_slave_0 left promiscuous mode [ 1800.511348] bridge0: port 1(bridge_slave_0) entered disabled state [ 1800.608573] device hsr_slave_1 left promiscuous mode [ 1800.648341] device hsr_slave_0 left promiscuous mode [ 1800.707852] team0 (unregistering): Port device team_slave_1 removed [ 1800.720669] team0 (unregistering): Port device team_slave_0 removed [ 1800.731345] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1800.758936] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1800.838779] bond0 (unregistering): Released all slaves 04:08:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000070a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:17 executing program 1: pause() seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f0000000980)="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") 04:08:17 executing program 3: pause() syz_execute_func(&(0x7f0000000740)="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") 04:08:17 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:17 executing program 5: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f0000000840)="c4e379614832074a2be92cbd980f053ef3aec4a37bf0c50141e2e922ebc4a2fd1ceb262fed80660f38463da16379637902000000f2d2dec461dc57b1e67d0b2500610051f20040dbe1491e2f16660f7f60d242a0eec5bf521784ae6b4cbec5c54d0f2c718f56676beeee8f2870b63b30319ebb70fe6581f0430fc0b267f34cb4ba1c58a8271e664105ba16f2ae66410f3a16288842f72bfd660fdf536bd1049999e1430fae27c4a27921f97cd8d8a1a12ad764c4313a5f406642bd0f383bd4d467460f330002f44064d266413a010f0f30ca30cac442fd21b19b0b0000ef00ddeac4c2801d9c96c9e8e9362e36f2a79ad0818194d800092ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000d5df82e440fdd0636b2aad9c741afa20f6baf00c4e39978c104c0414c598374fb0a070f001e002e0000570000a858edc4037d092101f20f1dbe0010000000e5c565970d22045c0b47cc474cf92f5c65c4002d08000000009b42a7a728f356564401a9bb000042c4414974ecd53131fbc4a27508313bec") [ 1801.952551] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1801.970605] audit: type=1326 audit(14898.025:13828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=20644 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 04:08:18 executing program 3: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f00000000c0)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9c4c2a1385999c421b8c25eb100008d3581810000262f65f789a6000000faffff7fc4c2b9b6b90000000000d2dec461e6172525000e818f470fc980008047f03acf8fe90c810f69e08f4cbec5c4c2858c3f2d56c4613fc21d90c7ab86c4213e5377000043d9497dbf825959438f34b262933a603c0671f0ffff000068803000000016565605ba16f2aed9fdfeebf5f5f2f6f625adeab413bc7b1f00efc421792b5524ef0008e4a25600b150400f381da900e001c4e2d59134ff74d866dee4b6c442f191047b8f49580197feffff7f660f38de8e85a1f32646dec43b7d0f12e400f4260fe88c4200000000ca30cac46190546104f3450f2c6b0009912af3430f36f20ff08e6769b369c463ad0b5890ca6c0f84500000006466420f3a0b0100d800b36d6d8175ef9d8f000000c462a52b6e0bc4a17a4295f046839200000080a79cffffc3bd2645c1d9e48300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa266681380010c40250f7a698b900008374fb0a07c40155f64e06f247acecedc4620d8e56b0470afcf2f22ef0836d289997c1045c0b47ccc4c1fa113a3e4683c0042ef246e16dc481635a9c70d3813811fad7fbfbc941ecec31c4663ef0430fabb9080000007ddd460f544e080000c421e96719") [ 1802.134224] net_ratelimit: 20 callbacks suppressed [ 1802.134232] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.144422] protocol 88fb is buggy, dev hsr_slave_1 04:08:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000000a0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1802.333886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:18 executing program 3: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000040)="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") 04:08:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000000f0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1802.454188] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.459556] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.532135] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000060140a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1802.614192] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.619372] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.694198] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.699531] protocol 88fb is buggy, dev hsr_slave_1 04:08:18 executing program 5: syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="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") [ 1802.769728] audit: type=1326 audit(14898.825:13829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=20644 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1802.794768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1803.334230] protocol 88fb is buggy, dev hsr_slave_0 [ 1803.339510] protocol 88fb is buggy, dev hsr_slave_1 [ 1804.144011] IPVS: ftp: loaded support on port[0] = 21 [ 1804.210319] chnl_net:caif_netlink_parms(): no params data found [ 1804.246094] bridge0: port 1(bridge_slave_0) entered blocking state [ 1804.252676] bridge0: port 1(bridge_slave_0) entered disabled state [ 1804.259842] device bridge_slave_0 entered promiscuous mode [ 1804.267762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1804.274458] bridge0: port 2(bridge_slave_1) entered disabled state [ 1804.281920] device bridge_slave_1 entered promiscuous mode [ 1804.300179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1804.309438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1804.328900] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1804.336367] team0: Port device team_slave_0 added [ 1804.341937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1804.349425] team0: Port device team_slave_1 added [ 1804.355060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1804.362453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1804.416348] device hsr_slave_0 entered promiscuous mode [ 1804.485810] device hsr_slave_1 entered promiscuous mode [ 1804.514659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1804.521913] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1804.536882] bridge0: port 2(bridge_slave_1) entered blocking state [ 1804.543488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1804.550387] bridge0: port 1(bridge_slave_0) entered blocking state [ 1804.557011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1804.597039] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1804.603220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1804.613635] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1804.623525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1804.631213] bridge0: port 1(bridge_slave_0) entered disabled state [ 1804.638642] bridge0: port 2(bridge_slave_1) entered disabled state [ 1804.646363] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1804.659061] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1804.666122] 8021q: adding VLAN 0 to HW filter on device team0 [ 1804.676562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1804.684561] bridge0: port 1(bridge_slave_0) entered blocking state [ 1804.691027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1804.701946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1804.710297] bridge0: port 2(bridge_slave_1) entered blocking state [ 1804.716720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1804.737948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1804.747143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1804.760191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1804.776049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1804.783611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1804.797472] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1804.803701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1804.821976] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1804.833793] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000200a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:21 executing program 1: syz_genetlink_get_family_id$tipc(0x0) dup(0xffffffffffffffff) mlockall(0x1) syz_execute_func(&(0x7f00000006c0)="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") 04:08:21 executing program 5: pause() nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) syz_execute_func(&(0x7f0000000740)="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") 04:08:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:21 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:21 executing program 3: syz_execute_func(&(0x7f0000000200)="4a2be966420f72f0f5980f0578f3aec4a37bf0c50341e2e926b5c9f34a0f38f60128218d00a30000262ff342906646da4e3292221322131dd919dec4c6c100dc55b1e6172525000e818f470fc980008080e2859ed23c788fe97c810f69e08f4cbec5c4c2858c3f8fc4a1c573d1f6c4613fc21d9053c7ab86c4213e5377000043d9497dbf8259438f34b267f36ab40f68803000000056f20f5161c366410ffe3a1687286c6c0ff341ab00fe8f08e4a25600b1355809580900000081660fdf53098f49609a567bc4c4617b708cfa00000000007466dee450c1f043fe02d134e146dec43b7d0f18e4e4e4f4260fe88c4200000000ca30cac4017a7fc3bb3cbb3c0209912af3430f47bb00000000000045dc0f845000f04781ae04100000f1007d0000004258f313d800d800dd4805dfdf63a5b76e0b0ba17ae64295589cffffc3c4c27197a8820000004577cb0c0ce42ec4b1b57c1002020606b274c4410ff9720d838f09e89a5b00ddfafa485c835e2ec422e6c44115638b0c0000002cb18374fb0a07c40155f64e0666460fddc7eced36660f38058b97619236c421c96b82e2626320979747910002c1045c0b47cc47cc5c66420f1a436e2ef246e16d44800199bb00004242fbc9880c00c461b016a7df6900003422") syz_execute_func(&(0x7f0000000400)="c4e379614832074a2be92cbd980f053ef3aec4a37bf0c50141e2e922ebc461ff70070e262fed80660f38463da16379637902000000f2d2dec461dc57b1e67d0b2500610051fa0040dbe1491e2f16660f7f60d242a0eec5bf521784ae6b4cbec5c54d0f2c718f56676beeee8f2870b63b30319ebb70fe658fa9d09a8d7a00000067f34cb4ba1c58a8271e664105ba16f2ae66410f3a16288866410fd1e4fd660fdf536bd1049999e1430fae27c4a27921f97cd8d8a1a12ad764c4313a5f4066420f383bd46767460f330002f44064d266413a010f0f30ca30cac442fd21b19b0b0000ef00ddeac4c2801d9c96c9e8e9362e36f2a79ad0818194d800092ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000d5df82e440fdd0636b2aad9c741afa20f6baf00c4e39978c104c0414c598374fb0a070f001e002e0000570000a858edc4037d092101f20f1dbe0010000000e5c565970d22045c0b47cc474cf92f5c65c4002d08000000009b42a7a72856564401a9bb000042c4414974ecd53131fbc4a27508313bec") [ 1805.097721] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000280a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:21 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4600000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:21 executing program 3: pause() syz_execute_func(&(0x7f0000001200)="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") [ 1805.297930] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:21 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4800000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000003f0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:21 executing program 3: syz_execute_func(&(0x7f0000000400)="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") syz_execute_func(&(0x7f0000000d80)="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") [ 1805.578490] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000480a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1805.665104] device bridge_slave_1 left promiscuous mode [ 1805.671332] bridge0: port 2(bridge_slave_1) entered disabled state [ 1805.735776] device bridge_slave_0 left promiscuous mode [ 1805.751380] bridge0: port 1(bridge_slave_0) entered disabled state 04:08:21 executing program 1: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f0000000fc0)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038218d00a30000262ff342906646da4e3292a16379637902000000dec41455b3e61763632525000e8182b00080008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad764b5c1c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1f2af3420f2a520000002665e94612b6c800008450000000d0818194d8004451ae88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0414c598374fb0a07c401f1eb27f247aceced36660f38058b976192361d09f5e5978047910002c1045c0b47dc47ccaf268111a989000065002d08000000c4417913a299b589999959060f0f8153000000ae0f4401a9bb000042c4414974ec0b31c4617ddd880c0000003523") 04:08:22 executing program 5: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000540)="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") [ 1806.017189] audit: type=1326 audit(14902.075:13830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21220 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1806.047110] device hsr_slave_1 left promiscuous mode [ 1806.109480] device hsr_slave_0 left promiscuous mode [ 1806.158943] team0 (unregistering): Port device team_slave_1 removed [ 1806.187271] team0 (unregistering): Port device team_slave_0 removed [ 1806.219843] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1806.280029] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1806.400342] bond0 (unregistering): Released all slaves [ 1806.468364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1806.479506] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1806.811674] audit: type=1326 audit(14902.865:13831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21220 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1807.494242] net_ratelimit: 26 callbacks suppressed [ 1807.494252] protocol 88fb is buggy, dev hsr_slave_0 [ 1807.504392] protocol 88fb is buggy, dev hsr_slave_1 [ 1807.577983] IPVS: ftp: loaded support on port[0] = 21 [ 1807.658765] chnl_net:caif_netlink_parms(): no params data found [ 1807.710221] bridge0: port 1(bridge_slave_0) entered blocking state [ 1807.721894] bridge0: port 1(bridge_slave_0) entered disabled state [ 1807.730977] device bridge_slave_0 entered promiscuous mode [ 1807.743655] bridge0: port 2(bridge_slave_1) entered blocking state [ 1807.751303] bridge0: port 2(bridge_slave_1) entered disabled state [ 1807.763932] device bridge_slave_1 entered promiscuous mode [ 1807.785448] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1807.794809] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1807.811252] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1807.819162] team0: Port device team_slave_0 added [ 1807.825096] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1807.832710] team0: Port device team_slave_1 added [ 1807.838313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1807.845951] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1807.916699] device hsr_slave_0 entered promiscuous mode [ 1807.954658] device hsr_slave_1 entered promiscuous mode [ 1807.994931] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1808.002474] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1808.018374] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.024902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1808.031634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.038272] bridge0: port 1(bridge_slave_0) entered forwarding state 04:08:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:24 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000240)="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") 04:08:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000004c0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:24 executing program 1: syz_execute_func(&(0x7f00000003c0)="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") syz_execute_func(&(0x7f0000000200)="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") 04:08:24 executing program 5: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000900)="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") [ 1808.077263] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1808.083497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1808.094872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1808.106171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1808.114468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.142385] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.154021] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1808.171675] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1808.182406] 8021q: adding VLAN 0 to HW filter on device team0 [ 1808.201174] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1808.219727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1808.244982] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.251946] bridge0: port 1(bridge_slave_0) entered forwarding state 04:08:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000600a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1808.294467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1808.326458] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.333024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1808.374197] protocol 88fb is buggy, dev hsr_slave_0 [ 1808.381786] protocol 88fb is buggy, dev hsr_slave_1 [ 1808.387015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1808.392777] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1808.414694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1808.450992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1808.470670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1808.492617] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1808.502639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1808.523832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1808.559860] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1808.588879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1808.624364] protocol 88fb is buggy, dev hsr_slave_0 [ 1808.629799] protocol 88fb is buggy, dev hsr_slave_1 [ 1808.694305] protocol 88fb is buggy, dev hsr_slave_0 [ 1808.699620] protocol 88fb is buggy, dev hsr_slave_1 [ 1808.744182] protocol 88fb is buggy, dev hsr_slave_0 [ 1808.749587] protocol 88fb is buggy, dev hsr_slave_1 04:08:24 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="99d072774a739ee4afabf33d63f3ef493906ff51be64805aff4f63ae80b88ed658955a91653364cf9d14bda375bc41505d2ac3d435962d1324d74d5d70c3e3e7a01f9a7675851c8e62fc73db84500ffb00a925d7cd1a57b6f9584124235bce49e0e1e365099212", 0x67, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="c9d0d1f9c1007a130ecaca6d5f2870939a77b4715b352f7e22a38388b638d052fbcb7367a587787dcc37aa3cab91b06233e7dc5d35aea13bdea47cdd5fcf441bf6fd5ff4c757cde2ef0152eeb73973c5dc110a962583325e7684604c6fbd0aa1e569a0d315e11f789ae2ad90cf2562926d845e3635c2737e2c2da06e89b70d0795cd0f2beb96e6e564237537533a83e6c289668d2c6d2cf73f9fe1ca0a1d48f914a8e647018b1e016e3f7f3b6816114f47578b7b62d550c1bc9474e9afe9321b4542284c8b5c8ad53ab81b13057adffcd31a09d12735768a52a960537b99dd0e5c6b", 0xe2, 0x0) keyctl$unlink(0x9, r0, r1) syz_execute_func(&(0x7f0000000280)="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") 04:08:24 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4927090000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000014600a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000680a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1808.853029] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:25 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4c00000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000006c0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1808.949977] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1809.097997] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1809.415655] device bridge_slave_1 left promiscuous mode [ 1809.421228] bridge0: port 2(bridge_slave_1) entered disabled state [ 1809.465446] device bridge_slave_0 left promiscuous mode [ 1809.471154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1809.647361] device hsr_slave_1 left promiscuous mode [ 1809.688529] device hsr_slave_0 left promiscuous mode [ 1809.728083] team0 (unregistering): Port device team_slave_1 removed [ 1809.738829] team0 (unregistering): Port device team_slave_0 removed [ 1809.751789] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1809.798842] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1809.868706] bond0 (unregistering): Released all slaves 04:08:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:27 executing program 1: socket$alg(0x26, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000001c0)={0x1000, 0x4ad8f99a9c86ad51, 0x400, 0x8, 0x1, @discrete={0x7, 0x4}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[], 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) gettid() 04:08:27 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x5102000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000740a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:27 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x182, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f00000001c0)={r1}) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 04:08:27 executing program 3: socket$alg(0x26, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) getpgid(0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000440)='/dev/video#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x400005, 0x84) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f00000001c0)={0x1000, 0x4ad8f99a9c86ad51, 0x400, 0x8, 0x1, @discrete={0x7, 0x4}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) getegid() lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[], 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) gettid() [ 1811.303884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:27 executing program 1: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f00000002c0)="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") 04:08:27 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 04:08:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000007a0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:27 executing program 5: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="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") [ 1811.651720] audit: type=1326 audit(14907.705:13832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21596 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1811.660391] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000fe800a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) getpgid(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000440)='/dev/video#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x400005, 0x84) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f00000001c0)={0x1000, 0x4ad8f99a9c86ad51, 0x400, 0x8, 0x1, @discrete={0x7, 0x4}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[], 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) [ 1811.832687] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000810a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1812.072213] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1812.452376] audit: type=1326 audit(14908.505:13833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21596 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1812.534272] net_ratelimit: 20 callbacks suppressed [ 1812.534281] protocol 88fb is buggy, dev hsr_slave_0 [ 1812.544614] protocol 88fb is buggy, dev hsr_slave_1 [ 1812.854189] protocol 88fb is buggy, dev hsr_slave_0 [ 1812.859395] protocol 88fb is buggy, dev hsr_slave_1 [ 1813.014246] protocol 88fb is buggy, dev hsr_slave_0 [ 1813.019364] protocol 88fb is buggy, dev hsr_slave_1 [ 1813.094181] protocol 88fb is buggy, dev hsr_slave_0 [ 1813.099875] protocol 88fb is buggy, dev hsr_slave_1 [ 1813.567313] IPVS: ftp: loaded support on port[0] = 21 [ 1813.631857] chnl_net:caif_netlink_parms(): no params data found [ 1813.669908] bridge0: port 1(bridge_slave_0) entered blocking state [ 1813.676898] bridge0: port 1(bridge_slave_0) entered disabled state [ 1813.684009] device bridge_slave_0 entered promiscuous mode [ 1813.691822] bridge0: port 2(bridge_slave_1) entered blocking state [ 1813.698306] bridge0: port 2(bridge_slave_1) entered disabled state [ 1813.705898] device bridge_slave_1 entered promiscuous mode [ 1813.722501] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1813.731755] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1813.734227] protocol 88fb is buggy, dev hsr_slave_0 [ 1813.744685] protocol 88fb is buggy, dev hsr_slave_1 [ 1813.761311] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1813.769139] team0: Port device team_slave_0 added [ 1813.775312] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1813.783018] team0: Port device team_slave_1 added [ 1813.789476] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1813.797182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1813.856819] device hsr_slave_0 entered promiscuous mode [ 1813.894648] device hsr_slave_1 entered promiscuous mode [ 1813.935993] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1813.943245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1813.957692] bridge0: port 2(bridge_slave_1) entered blocking state [ 1813.964293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1813.971062] bridge0: port 1(bridge_slave_0) entered blocking state [ 1813.977662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1814.017465] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1814.023679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1814.032750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1814.042886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1814.050481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1814.058305] bridge0: port 2(bridge_slave_1) entered disabled state [ 1814.066020] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1814.078413] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1814.084968] 8021q: adding VLAN 0 to HW filter on device team0 [ 1814.095176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1814.102993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1814.109525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1814.126044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1814.134322] bridge0: port 2(bridge_slave_1) entered blocking state [ 1814.140797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1814.161395] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1814.171540] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1814.181898] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1814.189585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1814.197813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1814.205865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1814.213724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1814.221680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1814.228851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1814.244179] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1814.256400] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000fec00a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:30 executing program 3: mknod(&(0x7f00000001c0)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0xffffffffffffff76}, 0x71) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xedb1f0d6) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) 04:08:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x14) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:30 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x182, 0x4) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 04:08:30 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6800000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:30 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x182, 0x4) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f00000001c0)={0x0, 0x2}) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) [ 1814.467060] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:30 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c00000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000f00a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1814.820397] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:30 executing program 3: socket$alg(0x26, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) getpgid(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) syz_open_dev$video(&(0x7f0000000440)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) getegid() gettid() 04:08:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000fc0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:31 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7100000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2, 0x8000, 0x8, 0xffffffff}]}) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x182, 0x4) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000001c0)={0x0, 0x2}) sendmmsg(r1, &(0x7f00000038c0), 0x4000000000000a8, 0x0) [ 1815.147121] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) [ 1815.266021] device bridge_slave_1 left promiscuous mode [ 1815.271595] bridge0: port 2(bridge_slave_1) entered disabled state 04:08:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000080fe0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:31 executing program 3: pause() syz_execute_func(&(0x7f00000011c0)="73004a2be92c3e93980f053ef3aec4a37bf0c50141e2e922eb66d995f214400666440f383dbe08000000ed660f38463da16379637902000000164ad2dede613657b1b60000c482514654fa3700d54bd4d4491e2f16c2e54c4cbec5c54d0f2c718f56eec442319ebb70fe6581f0430fc0b267f34cb4bab2585641564105ba16f2ae66410f3a162888c423c96cb83d000000fe66410fd1e426660fdf53098f69609bfb87a8e1430fae277cd8d8a1a12ad764c421a83a5fc0c081ac5fe0643619ec8004f4660f3804e0c442fd1d23ca30ca400f38253d0300000067ddeac4c2801d9c96c9e8e9362665e94612c8009ad0818194d8000f092ddd8f0b00c4a17ae64295c401977c4ffeffd2fb2e36646466264683b9080000000d5df82e440fdd0636b2aac4d9c741afa20f6baf00c4e399784104c0414e598374fb0a07450f633c0caccd58ed2e660ffb09f20f1dbe0010000000e5c565978047910002c10b47cc42e0ecf92f5c65002d0800000042b6a7a75e0f4401a9bb000042c4414974ecd5b1101e6035c8431e6035c8437508313bec") 04:08:31 executing program 1: pause() syz_execute_func(&(0x7f0000000380)="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") [ 1815.401401] device bridge_slave_0 left promiscuous mode [ 1815.410751] bridge0: port 1(bridge_slave_0) entered disabled state 04:08:31 executing program 3: syz_execute_func(&(0x7f0000000a40)="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") syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000840)="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") [ 1815.807966] device hsr_slave_1 left promiscuous mode [ 1815.880281] device hsr_slave_0 left promiscuous mode [ 1815.942407] team0 (unregistering): Port device team_slave_1 removed 04:08:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1815.993466] team0 (unregistering): Port device team_slave_0 removed [ 1816.042882] bond0 (unregistering): Releasing backup interface bond_slave_1 04:08:32 executing program 3: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f0000000440)="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") [ 1816.130573] bond0 (unregistering): Releasing backup interface bond_slave_0 04:08:32 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000d80)="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") r0 = open(&(0x7f0000000200)='./file0\x00', 0x200e02, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000580)={0x30, 0x5, 0x0, {0x0, 0x6, 0x7fff, 0x2}}, 0x30) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000500)={@dev={0xfe, 0x80, [], 0x1b}, 0x2, 0x3, 0x3, 0x4, 0x9}, &(0x7f0000000540)=0x20) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000240)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x5, {0x3, 0x1, 0x41, 0x21e0ea2e, 0x496, 0x7, {0x2, 0x94, 0x200, 0xfffffffffffffbff, 0x7, 0x4, 0x1, 0x7, 0x50, 0x24fc, 0x9, r1, r2, 0xe68, 0x1}}}, 0x90) 04:08:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:32 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x182, 0x4) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) [ 1816.426921] bond0 (unregistering): Released all slaves [ 1816.539440] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1817.897228] IPVS: ftp: loaded support on port[0] = 21 [ 1817.904220] net_ratelimit: 26 callbacks suppressed [ 1817.904229] protocol 88fb is buggy, dev hsr_slave_0 [ 1817.914577] protocol 88fb is buggy, dev hsr_slave_1 [ 1818.028562] chnl_net:caif_netlink_parms(): no params data found [ 1818.067582] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.074241] bridge0: port 1(bridge_slave_0) entered disabled state [ 1818.081284] device bridge_slave_0 entered promiscuous mode [ 1818.088423] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.095208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.102426] device bridge_slave_1 entered promiscuous mode [ 1818.120681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1818.130474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1818.148469] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1818.156399] team0: Port device team_slave_0 added [ 1818.162055] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1818.170473] team0: Port device team_slave_1 added [ 1818.176084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1818.183480] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1818.236086] device hsr_slave_0 entered promiscuous mode [ 1818.294693] device hsr_slave_1 entered promiscuous mode [ 1818.345846] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1818.352959] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1818.368195] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.374733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1818.383224] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.389996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1818.428297] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1818.434877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1818.443664] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1818.453673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1818.462051] bridge0: port 1(bridge_slave_0) entered disabled state [ 1818.469860] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.477461] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1818.490443] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1818.496993] 8021q: adding VLAN 0 to HW filter on device team0 [ 1818.508024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1818.515771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.522138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1818.533373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1818.541728] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.548254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1818.568041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1818.576247] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1818.595650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1818.603802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1818.612635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1818.621184] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1818.627721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1818.641101] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1818.654781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1818.744241] protocol 88fb is buggy, dev hsr_slave_0 [ 1818.749651] protocol 88fb is buggy, dev hsr_slave_1 [ 1818.775092] protocol 88fb is buggy, dev hsr_slave_0 [ 1818.780837] protocol 88fb is buggy, dev hsr_slave_1 04:08:34 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7400000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:34 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:08:34 executing program 3: socket$inet6(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="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") 04:08:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000c0fe0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 04:08:34 executing program 1: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000380)="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") [ 1818.864225] protocol 88fb is buggy, dev hsr_slave_0 [ 1818.869595] protocol 88fb is buggy, dev hsr_slave_1 [ 1818.939182] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:35 executing program 5: pause() syz_execute_func(&(0x7f0000000580)="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") [ 1818.984232] protocol 88fb is buggy, dev hsr_slave_0 [ 1818.989542] protocol 88fb is buggy, dev hsr_slave_1 04:08:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000ff0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:35 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a00000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:35 executing program 3: pause() syz_execute_func(&(0x7f0000000200)="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") 04:08:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000020a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) [ 1819.192023] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:35 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x8000000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:35 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 1819.351388] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1819.403307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000030a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1819.577281] device bridge_slave_1 left promiscuous mode [ 1819.598817] bridge0: port 2(bridge_slave_1) entered disabled state 04:08:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) socket$packet(0x11, 0x0, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) socket$inet6(0xa, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x700, 0x0, 0x0) [ 1819.658239] device bridge_slave_0 left promiscuous mode [ 1819.663991] bridge0: port 1(bridge_slave_0) entered disabled state 04:08:35 executing program 1: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x80001, 0x200b, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$tipc(r0, 0x0, 0x0, 0x0) 04:08:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") syz_execute_func(&(0x7f00000003c0)="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") [ 1819.937213] device hsr_slave_1 left promiscuous mode 04:08:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x91Z\xaf\x14\x90\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0xfd88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0xffe4) [ 1819.990873] device hsr_slave_0 left promiscuous mode [ 1820.069230] team0 (unregistering): Port device team_slave_1 removed [ 1820.139794] team0 (unregistering): Port device team_slave_0 removed 04:08:36 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 1820.198943] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1820.280106] bond0 (unregistering): Releasing backup interface bond_slave_0 04:08:36 executing program 5: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000a80)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866de6564f20fd6fdc1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9b9b0ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a299899999389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") [ 1820.438697] bond0 (unregistering): Released all slaves 04:08:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000040a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:36 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fd/0\x00') [ 1820.496298] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1820.669300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1821.541531] IPVS: ftp: loaded support on port[0] = 21 [ 1821.630104] chnl_net:caif_netlink_parms(): no params data found [ 1821.663815] bridge0: port 1(bridge_slave_0) entered blocking state [ 1821.670854] bridge0: port 1(bridge_slave_0) entered disabled state [ 1821.687084] device bridge_slave_0 entered promiscuous mode [ 1821.701971] bridge0: port 2(bridge_slave_1) entered blocking state [ 1821.710313] bridge0: port 2(bridge_slave_1) entered disabled state [ 1821.724975] device bridge_slave_1 entered promiscuous mode [ 1821.765080] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1821.774695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1821.791005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1821.799037] team0: Port device team_slave_0 added [ 1821.804945] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1821.812871] team0: Port device team_slave_1 added [ 1821.820224] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1821.828582] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1821.907516] device hsr_slave_0 entered promiscuous mode [ 1821.944545] device hsr_slave_1 entered promiscuous mode [ 1821.984769] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1821.992385] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1822.009678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1822.016180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1822.022784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1822.029178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1822.068870] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1822.076957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1822.086511] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1822.097989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1822.105904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1822.113023] bridge0: port 2(bridge_slave_1) entered disabled state [ 1822.120720] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1822.131954] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1822.138546] 8021q: adding VLAN 0 to HW filter on device team0 [ 1822.150078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1822.157814] bridge0: port 1(bridge_slave_0) entered blocking state [ 1822.164310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1822.185391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1822.193215] bridge0: port 2(bridge_slave_1) entered blocking state [ 1822.199683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1822.207817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1822.216268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1822.224383] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1822.241231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1822.251402] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1822.263033] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1822.277338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:08:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) [ 1822.285614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1822.293407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1822.306415] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1822.326179] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:38 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe4ffffff00000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:38 executing program 3: syz_execute_func(&(0x7f0000000740)="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") 04:08:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000050a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:38 executing program 1: pause() syz_execute_func(&(0x7f0000000580)="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") 04:08:38 executing program 5: syz_execute_func(&(0x7f0000000380)="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") syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001880)="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") [ 1822.614555] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000060a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:38 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xf298080000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1822.747444] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1822.761996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000070a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:38 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xff00000000000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1822.897779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1822.934172] net_ratelimit: 28 callbacks suppressed [ 1822.934180] protocol 88fb is buggy, dev hsr_slave_0 [ 1822.939277] protocol 88fb is buggy, dev hsr_slave_1 04:08:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000000a0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1823.111085] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000000f0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1823.254284] protocol 88fb is buggy, dev hsr_slave_0 [ 1823.259514] protocol 88fb is buggy, dev hsr_slave_1 [ 1823.274916] device bridge_slave_1 left promiscuous mode [ 1823.282051] bridge0: port 2(bridge_slave_1) entered disabled state [ 1823.337388] device bridge_slave_0 left promiscuous mode [ 1823.343640] bridge0: port 1(bridge_slave_0) entered disabled state [ 1823.414210] protocol 88fb is buggy, dev hsr_slave_0 [ 1823.419466] protocol 88fb is buggy, dev hsr_slave_1 [ 1823.494329] protocol 88fb is buggy, dev hsr_slave_0 [ 1823.499686] protocol 88fb is buggy, dev hsr_slave_1 [ 1823.657448] device hsr_slave_1 left promiscuous mode [ 1823.698806] device hsr_slave_0 left promiscuous mode [ 1823.739736] team0 (unregistering): Port device team_slave_1 removed [ 1823.750277] team0 (unregistering): Port device team_slave_0 removed [ 1823.762106] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1823.821637] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1823.931079] bond0 (unregistering): Released all slaves [ 1823.979849] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1823.990536] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1824.144246] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.149483] protocol 88fb is buggy, dev hsr_slave_1 [ 1824.851378] IPVS: ftp: loaded support on port[0] = 21 [ 1824.978178] chnl_net:caif_netlink_parms(): no params data found [ 1825.029777] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.041387] bridge0: port 1(bridge_slave_0) entered disabled state [ 1825.050466] device bridge_slave_0 entered promiscuous mode [ 1825.058400] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.064951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1825.072386] device bridge_slave_1 entered promiscuous mode [ 1825.091509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1825.100963] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1825.118771] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1825.127245] team0: Port device team_slave_0 added [ 1825.132797] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1825.140614] team0: Port device team_slave_1 added [ 1825.146183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1825.153823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1825.226168] device hsr_slave_0 entered promiscuous mode [ 1825.284710] device hsr_slave_1 entered promiscuous mode [ 1825.324900] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1825.332127] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1825.352606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.359220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1825.366055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.372548] bridge0: port 1(bridge_slave_0) entered forwarding state 04:08:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) 04:08:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x1004c) sendto$inet(r0, &(0x7f0000000280)="1ef7a5508ab840fb14ab1045d71ff44b9a6063f0d5d71ee0bb7f085727c605dde1dc7c3066de90766c9e846b5fa007cf3ea1ce4e0dc9244772bf654032fcde99454c76e4b89aa7d91d15027b9cbb1afa16b1913638bd02490275c0a0cc60834bde0781dc2803c4df96375697500437e617498d71e050ac790f57eb998b18a2e1141f034e2e09a092453cdab4cb0b6e502e8a2e2dd6014c5ceffea9d42edd5f2f065510a1c7533ec98484e26657bc44af68a3e753de8e0bb9c097ad6498a28c471c0d54ccd0a7200c3b", 0xc9, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 04:08:41 executing program 1: 04:08:41 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000540)="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") 04:08:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000280a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1825.425661] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1825.432921] 8021q: adding VLAN 0 to HW filter on device bond0 04:08:41 executing program 1: pause() syz_execute_func(&(0x7f0000000a80)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866de6564f20fd6fdc1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9b9b0ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a299899999389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") [ 1825.477378] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1825.501287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1825.514607] bridge0: port 1(bridge_slave_0) entered disabled state [ 1825.557151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1825.579598] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:08:41 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x182, 0x4) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 04:08:41 executing program 5: syz_execute_func(&(0x7f0000000540)="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") [ 1825.613649] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1825.646760] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1825.661131] 8021q: adding VLAN 0 to HW filter on device team0 [ 1825.682072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:08:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000480a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1825.710835] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.717827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1825.755336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1825.769259] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.775910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1825.820845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1825.846068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1825.886250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1825.908720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1825.926381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1825.944841] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1825.957018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1825.975847] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1826.008478] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1826.045753] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:42 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffff00000000, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x4008000000803, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/231, 0x1c}}], 0x12e, 0x0, 0x0) 04:08:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000004c0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1826.348820] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1826.964848] device bridge_slave_1 left promiscuous mode [ 1826.970400] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.035347] device bridge_slave_0 left promiscuous mode [ 1827.040893] bridge0: port 1(bridge_slave_0) entered disabled state [ 1827.197823] device hsr_slave_1 left promiscuous mode [ 1827.249678] device hsr_slave_0 left promiscuous mode [ 1827.310194] team0 (unregistering): Port device team_slave_1 removed [ 1827.320673] team0 (unregistering): Port device team_slave_0 removed [ 1827.331268] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1827.370476] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1827.455773] bond0 (unregistering): Released all slaves [ 1828.294225] net_ratelimit: 26 callbacks suppressed [ 1828.294234] protocol 88fb is buggy, dev hsr_slave_0 [ 1828.304552] protocol 88fb is buggy, dev hsr_slave_1 04:08:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x0) 04:08:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000600a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:44 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:08:44 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:08:44 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000440)='y\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mknod(&(0x7f00000002c0)='./file0\x00', 0x840, 0x5) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000dd76e1d9c3e6f67ef0cc69672527"]) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:08:44 executing program 5: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f0000001e00)="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") [ 1828.627726] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:08:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000680a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:44 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:08:44 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:08:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f0000006c0a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1828.910871] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1829.059617] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1829.174189] protocol 88fb is buggy, dev hsr_slave_0 [ 1829.179327] protocol 88fb is buggy, dev hsr_slave_1 04:08:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000740a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:08:45 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377006643d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866dee4b6c1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9bc4c1a65e360ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a2998999993e66410f79d82ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") [ 1829.399567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1829.494279] protocol 88fb is buggy, dev hsr_slave_0 [ 1829.499568] protocol 88fb is buggy, dev hsr_slave_1 04:08:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x5, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) fcntl$setstatus(r1, 0x4, 0x0) 04:08:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000d40)='\x00\xaf1\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) r2 = getegid() fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, r2, 0x1000) [ 1852.540613] team0 (unregistering): Port device team_slave_0 removed [ 1852.611930] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1852.690079] bond0 (unregistering): Releasing backup interface bond_slave_0 04:09:08 executing program 3: syz_execute_func(0x0) syz_execute_func(&(0x7f00000001c0)="c4e379614832074a2be91cb9980f053ef3aec4a37bf0c50141e2e922ebc4a2fd1ceb262fed80660f38463da16379637906000000f2d2dec461dc57b1e67d0b2500610051fa0040dbe1491e2f16660f7f60d20f3801bd050000004cbec5c54d0f2c718f56676beeee8f2870b63b30319ebb70fe6581f0430fc0b267f34cb4ba1c58a8271e664105ba16f2ae66410f3a16288842f72bfd660fdf536bd1049999e1430fae27c4a27921f97cd8d8a1a12ad764c4313a5f406642bd0f383bd4d467460f330002f44064d266413a010f0f30ca30cac442fd21b19b0b0000ef00ddeac4c2801d9c96c9e8e9362e36f2a79ad0818194d800092ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000d5df698b90000002e440fdd0636b2aad9c741afa20f6baf00c4e39978c104c0414c598374fb0a070f001e0000570000a858edc4037d092101f20f1dbe0010000000e5c565970d22045c0b47cc474cf92f5c65c4002d08000000009b42a7a728f356564401a9bb000042c4414974ecd53131fbc4a27508313bec") 04:09:08 executing program 5: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000ac0)="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") [ 1852.909498] bond0 (unregistering): Released all slaves [ 1852.922821] IPVS: ftp: loaded support on port[0] = 21 04:09:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08040800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1853.018874] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1853.972234] IPVS: ftp: loaded support on port[0] = 21 [ 1854.132912] chnl_net:caif_netlink_parms(): no params data found [ 1854.134198] net_ratelimit: 20 callbacks suppressed [ 1854.134206] protocol 88fb is buggy, dev hsr_slave_0 [ 1854.144114] protocol 88fb is buggy, dev hsr_slave_1 [ 1854.213057] bridge0: port 1(bridge_slave_0) entered blocking state [ 1854.220442] bridge0: port 1(bridge_slave_0) entered disabled state [ 1854.230453] device bridge_slave_0 entered promiscuous mode [ 1854.238222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1854.245809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1854.252864] device bridge_slave_1 entered promiscuous mode [ 1854.271057] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1854.280580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1854.299877] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1854.307953] team0: Port device team_slave_0 added [ 1854.313911] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1854.321959] team0: Port device team_slave_1 added [ 1854.327852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1854.336214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1854.398282] device hsr_slave_0 entered promiscuous mode [ 1854.435008] device hsr_slave_1 entered promiscuous mode [ 1854.464446] protocol 88fb is buggy, dev hsr_slave_0 [ 1854.469603] protocol 88fb is buggy, dev hsr_slave_1 [ 1854.488673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1854.499286] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1854.518225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1854.524686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1854.531413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1854.537957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1854.596255] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1854.602572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1854.611352] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1854.614198] protocol 88fb is buggy, dev hsr_slave_0 [ 1854.622533] protocol 88fb is buggy, dev hsr_slave_1 [ 1854.622718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1854.635590] bridge0: port 1(bridge_slave_0) entered disabled state [ 1854.653451] bridge0: port 2(bridge_slave_1) entered disabled state [ 1854.661596] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1854.674189] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1854.680289] 8021q: adding VLAN 0 to HW filter on device team0 [ 1854.691617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1854.699547] bridge0: port 1(bridge_slave_0) entered blocking state [ 1854.704349] protocol 88fb is buggy, dev hsr_slave_0 [ 1854.705990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1854.711049] protocol 88fb is buggy, dev hsr_slave_1 [ 1854.727047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1854.735100] bridge0: port 2(bridge_slave_1) entered blocking state [ 1854.741789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1854.766427] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1854.775553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1854.783263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1854.791128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1854.801770] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1854.808003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1854.815369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1854.828226] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1854.841519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1854.924171] protocol 88fb is buggy, dev hsr_slave_0 [ 1854.929364] protocol 88fb is buggy, dev hsr_slave_1 04:09:11 executing program 2: pause() syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x40) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d4") syz_execute_func(&(0x7f0000001640)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9f2abc421b8c25cb100008d3581810000262f46d9f96646da4e32c4c2b9b6b90000000000d2dec461dc55b1e6172525000e818f470fc980008047f03acf8fe97c810f69e08f4cbec5c4c2858c3f2d56c4613fc21d9053c7ab86c4213e5377000043d9497dbf82595943a642d17f00660f3a603d06f0ffff00c4e16d71d4d2564105ba16f2aed9fdfeebf5f5eba225adeab413c4c37d096208c2c481fa706b00f9ef0008e4a25600b150400f381da900e001c4d5c6d59134ffffff66dee4b6c442f191047b8f49580197feffff7f660f38de8e85e1f32646dec43b7d0f12e400f4260fe88c4200000000ca30cac46190546104f3450f2c6b0009912af3430fc4c17829c8c463ad0b5890ca6c0f84500000006466420f3a0b0100d8008fe978e16a85b36d6d8175ef9d8f000000c462a52b6e0bc4a17a4295f046839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa246681380010c40250f7a698b900008374fb0a07c40155f64e06f247aceced470afc6b82e26263209797c1045c0b47cc5c389f9f140f0f2ef246e16dc481635a9c70d3813811fad7fbfbc941ecec400fadd5663ef0430fabb90800000045ee880c0000003422") 04:09:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08050800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:11 executing program 1: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="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") 04:09:11 executing program 3: syz_execute_func(&(0x7f0000001140)="c4e3f9614832074a2be9c4023998d7410f053ef3aec4a37bf0c50123c1e2e9c4c24d4767008d00a30000262ff342906646da4e3292a163396379020000a52020c41455b3e61763632525000e818280008080e285660fe2830e000000cf491e2f16f0410f117b0969e08f4cbec5c46248f3cd8f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7640fe486304dd1cec485e1f326470f5f103b7d0f12e400f467470fae70d23830ca30caab6abbd9c4022191c461997468e62af3420f2a52000b512c092665e94612b6c800008450000000d0818194d8004451aec4219d5c343cf42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e414c598374fb0a07c401f1eb27f247acf536f0838027000000daec36660f38058b976192360ffc834c00000066470f79e10002c1045c0b47dc47ccaf268111a9890000dee4c4417913a299b589999959020f0f8153000000ae0f4401a9bb000042c4414974ec0b31c4617ddd880c00000035220e") syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) 04:09:11 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x24, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:11 executing program 5: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f0000000100)="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") [ 1855.057109] nla_parse: 1 callbacks suppressed [ 1855.057119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08060800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1855.130630] audit: type=1326 audit(14951.178:13836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=25909 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 04:09:11 executing program 1: syz_execute_func(&(0x7f0000000dc0)="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") r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000300)=0x8004000939, 0x3bb) syz_execute_func(&(0x7f00000000c0)="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") 04:09:11 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x25, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:11 executing program 3: pause() syz_execute_func(&(0x7f0000000680)="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") openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) 04:09:11 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1855.346667] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08070800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1855.545904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:12 executing program 2: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f0000000000)="c4e379614832074a2be91cb9980f053ef3aec4a37bf0c50141e2e922ebc4a2fd1ceb262fed80660f38463da16379637906000000f2d2dec461dc57b1e67d0b2500610051fa0040dbe1491e2f16660f7f60d20f3801bd050000004cbec5c54d0f2c718f56676beeee8f2870b63b30319ebb70fe6581f0430fc0b267f34cb4ba1c58a8271e664105ba16f2ae66410f3a16288842f72bfd660fdf536bd1049999e1430fae27c4a27921f97cd8d8a1a12ad764c4313a5f406642bd0f383bd4d467460f330002f44064d266413a010f0f30ca30cac442fd21b19b0b0000ef00ddeac4c2801d9c96c9e8e9362e36f2a79ad0818194d800092ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000d5df698b90000002e440fdd0636b2aad9c741afa20f6baf00c4e39978c104c0414c598374fb0a070f001e0000570000a858edc4037d092101f20f1dbe0010000000e5c565970d22045c0b47cc474cf92f5c65c4002d08000000009b42a7a728f356564401a9bb000042c4414974ecd53131fbc4a27508313bec") 04:09:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080a0800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:12 executing program 3: pause() syz_execute_func(&(0x7f0000000ac0)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9c4c2a1385999c421b8c25cb100008d3581810000262f46d9f9c4c2b9b6b90000000000d2dec4f20f78ee0003e6172525000e818f470fc980008047f03acf8fe90c810f69e08f4cbec5c4c2858c3f2d56c4613fc21d90f3440f2d7b0ac7ab86c4213e5377000043d9497dbf825959438f349062933a603c510771f0ffff000068803000000016565605ba16f2aed9fdfeebf5f5eba225adeab413bc7b1f00efc421792b5524ef0008e4a25600b150400f381da900e001c4e2d59134ff410f680f66dee4b6c442f191047b8f49580197feffff7f660f38de8e85a1f32646dec4c43b79980f980f00f4260fe88c4200170000ca30cac46190546104f3450f2c6b0009912af3430f36f20ff08e6769b369c463ad0b5890ca2e0d8f0000000f84500000006466420f3a0b0100c4a179172c35ef5b34f3b36d6d00c462a52b6e0bc4a17a4295f046839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa266681380010c40250f7a698b900008374fb0a07c40155f64e06f247aceced470afc6b82e26263209797c1045c0b47ccc4c1fa113a389f9f140f0f2ef246e16dc481635a9c70d3813811fad7fbfbc9471eecec31c4663ef0430fabb9080000007ddd460f544e080000c421e96719") 04:09:12 executing program 5: syz_execute_func(&(0x7f0000000880)="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") syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000780)="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") [ 1855.971348] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080f0800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:12 executing program 1: syz_execute_func(&(0x7f0000000380)="4a2be966420f72f0f5980f0578f3aec4a37bf0c50341e2e926b5c9f34a0f38f60128218d00a30000262ff342906646da4e3292221322131dd919dec4c6c100dc55b1e6172525000e818f470fc980008080e2859ed23c788fe97c810f69e08f4cbec5c4c2858c3f8fc4a1c573d1f6c4613fc21d9053c7abc401f8296504213e5337000043d9497dbf8259438f34b267f36ab40f68803000000056f20f5161c366410ffe3a1687286c0ff341ab00fe8f08e4a25600b1355809580900000081660fdf53098f49609a567bc4c4617b708cfa0000000000f46c6464e450c1f043fe02d134e188dec43b7d0f18e4e4e4f43665660f73d8fcca30cac4017a7fc36467479c09912af3430f47bb00000000000045dc0ff04781ae00100000f1000000c44258f313d800d800dd4805dfdf63a5b76e0b0ba17ae64295589cffffc3c4c27197a8820000004577cb0c0ce42ec4b1b57c1002020606b274c4410ff9720d838f09e89a5b00ddfafa485c835e2ec43e264f0faea05d419594c44115638b0c0000002cb18374fb0a07c40155f64e0666460fddc7268174720f088455d7ed36660f38058b97619236c421c96b82e2626320979747950002c1045c0b47cc47cc5c66420f1a436e2ef246e16d44800199bb00004242fbc9880c00c461b016a7df6900003422") syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001180)="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") 04:09:12 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') syz_execute_func(&(0x7f0000000280)="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") 04:09:12 executing program 5: pause() syz_open_procfs(0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe97c810f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377006643d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be289e2897474d866dee4b6c1f043fe022e0f63b80000000046dec43b7d0f12e40f5c13260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9bc4c1a65e360ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd761928b3682928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a2998999993e66410f79d82ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003423") [ 1856.232234] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08280800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:12 executing program 3: syz_execute_func(&(0x7f0000000a40)="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") syz_execute_func(&(0x7f0000000400)="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") [ 1856.498304] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1857.859516] IPVS: ftp: loaded support on port[0] = 21 [ 1857.937655] chnl_net:caif_netlink_parms(): no params data found [ 1857.966692] bridge0: port 1(bridge_slave_0) entered blocking state [ 1857.973357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1857.981375] device bridge_slave_0 entered promiscuous mode [ 1857.992979] bridge0: port 2(bridge_slave_1) entered blocking state [ 1857.999706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1858.007663] device bridge_slave_1 entered promiscuous mode [ 1858.026789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1858.036868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1858.059996] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1858.067993] team0: Port device team_slave_0 added [ 1858.073933] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1858.081620] team0: Port device team_slave_1 added [ 1858.087234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1858.094840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1858.167337] device hsr_slave_0 entered promiscuous mode [ 1858.204575] device hsr_slave_1 entered promiscuous mode [ 1858.245219] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1858.252827] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1858.260335] device bridge_slave_1 left promiscuous mode [ 1858.268048] bridge0: port 2(bridge_slave_1) entered disabled state [ 1858.314923] device bridge_slave_0 left promiscuous mode [ 1858.320403] bridge0: port 1(bridge_slave_0) entered disabled state [ 1858.459564] device hsr_slave_1 left promiscuous mode [ 1858.517866] device hsr_slave_0 left promiscuous mode [ 1858.557896] team0 (unregistering): Port device team_slave_1 removed [ 1858.570463] team0 (unregistering): Port device team_slave_0 removed [ 1858.580590] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1858.628285] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1858.710637] bond0 (unregistering): Released all slaves [ 1858.772650] bridge0: port 2(bridge_slave_1) entered blocking state [ 1858.779094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1858.785811] bridge0: port 1(bridge_slave_0) entered blocking state [ 1858.792206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1858.829461] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1858.836621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1858.846166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1858.856315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1858.864022] bridge0: port 1(bridge_slave_0) entered disabled state [ 1858.871782] bridge0: port 2(bridge_slave_1) entered disabled state [ 1858.879481] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1858.892629] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1858.899013] 8021q: adding VLAN 0 to HW filter on device team0 [ 1858.910083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1858.918308] bridge0: port 1(bridge_slave_0) entered blocking state [ 1858.925127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1858.943507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1858.950903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1858.959658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1858.967828] bridge0: port 2(bridge_slave_1) entered blocking state [ 1858.974265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1859.008011] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1859.015214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1859.026549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1859.034784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1859.045790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1859.055248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1859.063458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1859.073211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1859.080609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1859.088904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1859.097176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1859.108044] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1859.115952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1859.125811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1859.139803] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1859.147498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1859.156113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1859.166901] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1859.173024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1859.192292] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1859.208872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1859.284175] net_ratelimit: 28 callbacks suppressed [ 1859.284183] protocol 88fb is buggy, dev hsr_slave_0 [ 1859.294505] protocol 88fb is buggy, dev hsr_slave_1 [ 1859.404247] protocol 88fb is buggy, dev hsr_slave_0 [ 1859.409429] protocol 88fb is buggy, dev hsr_slave_1 04:09:15 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2d, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08480800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:15 executing program 3: pause() nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="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") 04:09:15 executing program 2: pause() syz_execute_func(&(0x7f0000000800)="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") 04:09:15 executing program 1: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f00000002c0)="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") 04:09:15 executing program 5: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f00000000c0)="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") [ 1859.494263] protocol 88fb is buggy, dev hsr_slave_0 [ 1859.499652] protocol 88fb is buggy, dev hsr_slave_1 [ 1859.524273] protocol 88fb is buggy, dev hsr_slave_0 [ 1859.529396] protocol 88fb is buggy, dev hsr_slave_1 [ 1859.597059] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1859.610928] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a084c0800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1859.637147] audit: type=1326 audit(14955.688:13837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26496 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1859.664238] protocol 88fb is buggy, dev hsr_slave_0 [ 1859.669424] protocol 88fb is buggy, dev hsr_slave_1 [ 1859.713119] audit: type=1326 audit(14955.718:13838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26495 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 04:09:15 executing program 3: syz_execute_func(&(0x7f0000000180)="c4e3f9614832074a2be9c4023998d7410f053ef3aec4a37bf0c50123c1e2e938218d00a30000262ff342906646da4e3292a163396379020000a52020c41455b3e61763632525000e818280008080e285660fe2830e000000cf491e2f16f0410f117b0969e08f4cbec5c46248f3cd8f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f68803000000056470f18d166410f3a162888f3af0000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7640fe486304dd1cec485e1f326470f5f103b7d0f12e400f467470fae70d23830ca30caab6abbd9c40221911f1f2af3420f2a520047da73092665e94612b6c800008450000000d0818194d8004451ae88f4f42d92f9f928c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0414c598374fb0a07c401f1eb27f247acf5ecec36660f38058b976192360ffc834c00000066470f79e10002c1045c0b47dc47ccaf268111a989000065002d08000000c4417913a299b589999959020f0f8153000000ae0f4401a9bb000042c4414974ec0b31c4617ddd880c00000035220e") fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) 04:09:15 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3a, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08600800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1859.819707] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1859.948474] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:16 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x43, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:16 executing program 3: pause() syz_execute_func(&(0x7f0000000040)="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") 04:09:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08680800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1860.187842] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a086c0800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:16 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000280)="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") [ 1860.392861] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1860.442073] audit: type=1326 audit(14956.488:13839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26495 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 04:09:16 executing program 2: pause() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f0000001100)="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") 04:09:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000076, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = dup(r0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)={0x11c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x108, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xab}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b806e0adf79f747ab9733b2f0d25edabc495c9960c57efd682090730f81cbfc55e0d08fe00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200"/1360], 0x550) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendto$inet(r0, &(0x7f0000001600)='(', 0x1, 0x9, 0x0, 0x0) 04:09:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08740800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:16 executing program 5: [ 1860.563934] audit: type=1326 audit(14956.488:13840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26496 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 04:09:16 executing program 3: pause() syz_execute_func(&(0x7f00000002c0)="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") 04:09:16 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="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") [ 1860.699703] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1860.747232] audit: type=1326 audit(14956.788:13841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26940 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 04:09:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a087a0800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1861.036495] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1861.539559] audit: type=1326 audit(14957.588:13842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26940 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 1862.104942] device bridge_slave_1 left promiscuous mode [ 1862.110473] bridge0: port 2(bridge_slave_1) entered disabled state [ 1862.165165] device bridge_slave_0 left promiscuous mode [ 1862.170642] bridge0: port 1(bridge_slave_0) entered disabled state [ 1862.298428] device hsr_slave_1 left promiscuous mode [ 1862.352037] device hsr_slave_0 left promiscuous mode [ 1862.411339] team0 (unregistering): Port device team_slave_1 removed [ 1862.427877] team0 (unregistering): Port device team_slave_0 removed [ 1862.440787] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1862.488733] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1862.566993] bond0 (unregistering): Released all slaves [ 1862.623892] IPVS: ftp: loaded support on port[0] = 21 [ 1862.697973] chnl_net:caif_netlink_parms(): no params data found [ 1862.737054] bridge0: port 1(bridge_slave_0) entered blocking state [ 1862.743512] bridge0: port 1(bridge_slave_0) entered disabled state [ 1862.750687] device bridge_slave_0 entered promiscuous mode [ 1862.757936] bridge0: port 2(bridge_slave_1) entered blocking state [ 1862.766311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1862.773500] device bridge_slave_1 entered promiscuous mode [ 1862.793470] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1862.803480] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1862.824326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1862.831821] team0: Port device team_slave_0 added [ 1862.837831] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1862.845655] team0: Port device team_slave_1 added [ 1862.851174] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1862.858675] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1862.926887] device hsr_slave_0 entered promiscuous mode [ 1862.964523] device hsr_slave_1 entered promiscuous mode [ 1863.005699] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1863.012831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1863.081109] bridge0: port 2(bridge_slave_1) entered blocking state [ 1863.087584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1863.094338] bridge0: port 1(bridge_slave_0) entered blocking state [ 1863.100721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1863.138431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1863.147723] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1863.158443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1863.167845] bridge0: port 1(bridge_slave_0) entered disabled state [ 1863.175219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1863.188110] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1863.202042] 8021q: adding VLAN 0 to HW filter on device team0 [ 1863.213781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1863.228730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1863.235322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1863.259953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1863.273250] bridge0: port 2(bridge_slave_1) entered blocking state [ 1863.279809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1863.312389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1863.321607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1863.344789] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1863.352709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1863.361980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1863.377280] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1863.383582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1863.416794] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1863.441672] 8021q: adding VLAN 0 to HW filter on device batadv0 04:09:19 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:19 executing program 1: pause() syz_execute_func(&(0x7f0000000900)="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") 04:09:19 executing program 3: syz_genetlink_get_family_id$tipc(0x0) socketpair(0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="c4e3f9614832074a2be93693410f053ef3aec4a37bf0c50123c1e2e9e9b5c9459038a48d00a30000262ff342906646dae54e32bc32bc6379637902000000de911455b3e617634c63e2e2000e81822e0fbdf980008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718f56c4213e537700c443d9497dbf59f0438f34b267f36ab40f6880300000005666f0010d0000000066410f3a162888c421fe10b9437f67b40000c4a171f536fe41ff500909660fdf53098f69609b5687e8e17474d8d8a1de2ad7648fc8509e4492ab00c4a23a5fc0660f38de8e85e1f326470f5f103b7d0f12e400f4e39b3830ca30caab6abbd9c40221911f1ff2470f01c32eaf00002665e94612b6c8c7d2fefe5000c4c1b16331d0818194d8004451ae88f4f4c46185faa799f50000c4a17ae642951cffc4c3bd7c6d830045770c64e42e440bdda90606b2aa0f485c5e2e8fa97812c0c423096c9404bd0000009d8374d0fb0a070701f1eb27f247aceecccc36660f38058b976192361d09f5e59780479100c4c3150fe108045cc441b9550047ccaf89898111a989000065002d08000000c4417913a299b589999959c4c2b9ae50240f4401faa9bb00004242414974bc0b31c4617ddd880c00000023") 04:09:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08fc0800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x10baf6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) rt_sigtimedwait(&(0x7f0000000500), 0x0, 0x0, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) tkill(r2, 0x1000000000015) 04:09:19 executing program 5: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'\x00\x00\xf6\x8c\x00\x00\x00\x00\x9bU\x00\x00\xc5\xcb\x00', 0x43732e5398416f1a}) ioctl$VT_RELDISP(r0, 0x5605) [ 1863.769706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08000a00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:19 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x460580, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0xc592, 0x0, 0x0, 0xf6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 04:09:20 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x51, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1863.960065] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1863.984441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:20 executing program 3: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x460580, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0xc592, 0x0, 0x0, 0xf6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 04:09:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08001100030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:20 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x53, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:20 executing program 2: clone(0x100000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$poke(0x21, r0, 0x0, 0x0) ptrace$setsig(0x8, r0, 0x0, &(0x7f0000000000)) [ 1864.254851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1864.275767] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1864.534206] net_ratelimit: 30 callbacks suppressed [ 1864.534216] protocol 88fb is buggy, dev hsr_slave_0 [ 1864.544644] protocol 88fb is buggy, dev hsr_slave_1 04:09:20 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1261319bd070") ftruncate(r0, 0x8003f1) write$P9_RMKNOD(r0, &(0x7f00000001c0)={0x14}, 0x14) r2 = open(&(0x7f0000000200)='./bus\x00', 0x121401, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000280)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000ffdf"]) 04:09:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080e2400030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:20 executing program 2: socket$alg(0x26, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) getpgid(0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x400005, 0x84) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f00000001c0)={0x1000, 0x0, 0x400, 0x8, 0x1, @discrete={0x7, 0x4}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) getegid() lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[], 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) gettid() [ 1864.781470] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:20 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x4]}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = dup3(r0, r1, 0x0) write$input_event(r2, &(0x7f00000002c0)={{0x77359400}, 0x0, 0x0, 0x5}, 0x18) [ 1864.864167] protocol 88fb is buggy, dev hsr_slave_0 [ 1864.869553] protocol 88fb is buggy, dev hsr_slave_1 04:09:21 executing program 5: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)={0x0}, 0xb8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)=0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffffd2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) 04:09:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08002f00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc) getpeername(r0, 0x0, &(0x7f0000000080)) [ 1865.014384] protocol 88fb is buggy, dev hsr_slave_0 [ 1865.019571] protocol 88fb is buggy, dev hsr_slave_1 [ 1865.094219] protocol 88fb is buggy, dev hsr_slave_0 [ 1865.099535] protocol 88fb is buggy, dev hsr_slave_1 [ 1865.186677] audit: type=1400 audit(14961.228:13843): avc: denied { connect } for pid=27311 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:09:21 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0xd, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "98ef9b0f"}, 0x0, 0x0, @userptr, 0x4}) 04:09:21 executing program 3: syz_execute_func(&(0x7f0000000dc0)="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") syz_execute_func(&(0x7f0000000440)="c4e379614832074a2be92cc3980f053ef3aec4a37bf0c50141e2e922eb66d995f2144006460f0167abed80660f38463da16379637902000000f2d2dec4c2e99cfe00610061512e660f80000000813347420040311e2f16660f7f60d242a0eec5bf521784ae6b4cbec5c54d0f2c718f566beeee42319ebb70fe651c58a8271e664105ba1666460f6ca70288000066410f3a162888c423c96cb83d000000fe66410fd1e4269a0fdf43096b1104a8e1c4a27921f97cd8f3450fabe1c4213a5fc066420f383bd46767460f330000f43830ca30cac442fd21b19b0b0000ef02ddeac4c2901d6996c9e8e9362665e94612c8009ad089d38194d800002ddd8f0b00c4a17ae64295007b1cffd2c422b59aa9a7a400002e36646466264683b9080000000dfaf82e440fdd0636b2aad9c741afa20f6baf00c4e39978c104c0414c598374fb0a070f00ac1e00000000ac699e0000000019821d46edc4037d092101f20f1dbe001000002e26417a7365970d22045c0b47cc474cf95c439b42a7a72856564401a9bb000042c4414974ecd53131fbc4a27508313bec") 04:09:21 executing program 5: r0 = semget$private(0x0, 0x20000000107, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0xf9a4}], 0x1, 0x0) semctl$GETPID(r0, 0x7, 0xb, &(0x7f0000000040)=""/74) [ 1865.734230] protocol 88fb is buggy, dev hsr_slave_0 [ 1865.739553] protocol 88fb is buggy, dev hsr_slave_1 [ 1866.355081] device bridge_slave_1 left promiscuous mode [ 1866.360684] bridge0: port 2(bridge_slave_1) entered disabled state [ 1866.414899] device bridge_slave_0 left promiscuous mode [ 1866.420371] bridge0: port 1(bridge_slave_0) entered disabled state [ 1866.567917] device hsr_slave_1 left promiscuous mode [ 1866.607586] device hsr_slave_0 left promiscuous mode [ 1866.668312] team0 (unregistering): Port device team_slave_1 removed [ 1866.679110] team0 (unregistering): Port device team_slave_0 removed [ 1866.690814] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1866.740452] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1866.836615] bond0 (unregistering): Released all slaves [ 1866.877622] IPVS: ftp: loaded support on port[0] = 21 [ 1866.944302] chnl_net:caif_netlink_parms(): no params data found [ 1866.988660] bridge0: port 1(bridge_slave_0) entered blocking state [ 1866.995801] bridge0: port 1(bridge_slave_0) entered disabled state [ 1867.003116] device bridge_slave_0 entered promiscuous mode [ 1867.010432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1867.017888] bridge0: port 2(bridge_slave_1) entered disabled state [ 1867.025429] device bridge_slave_1 entered promiscuous mode [ 1867.047329] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1867.058853] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1867.077844] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1867.098291] team0: Port device team_slave_0 added [ 1867.104584] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1867.112093] team0: Port device team_slave_1 added [ 1867.117962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1867.125756] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1867.176706] device hsr_slave_0 entered promiscuous mode [ 1867.214643] device hsr_slave_1 entered promiscuous mode [ 1867.254883] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1867.262176] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1867.326688] bridge0: port 2(bridge_slave_1) entered blocking state [ 1867.333167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1867.339893] bridge0: port 1(bridge_slave_0) entered blocking state [ 1867.346602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1867.391428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1867.401764] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1867.413823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1867.429232] bridge0: port 1(bridge_slave_0) entered disabled state [ 1867.439717] bridge0: port 2(bridge_slave_1) entered disabled state [ 1867.456468] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1867.462576] 8021q: adding VLAN 0 to HW filter on device team0 [ 1867.480573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1867.498613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1867.505161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1867.531466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1867.544703] bridge0: port 2(bridge_slave_1) entered blocking state [ 1867.551245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1867.571109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1867.586911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1867.611137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1867.625451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1867.633360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1867.649619] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1867.658850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1867.688077] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1867.707671] 8021q: adding VLAN 0 to HW filter on device batadv0 04:09:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xf7, 0x0, 0x0, 0x2}}, 0x68) 04:09:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08003500030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 04:09:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) 04:09:24 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3fd, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x4000000) write$vnet(0xffffffffffffffff, 0x0, 0x0) 04:09:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 1868.048698] nla_parse: 5 callbacks suppressed [ 1868.048708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1868.084374] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080e5000030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:24 executing program 1: r0 = socket$inet6(0xa, 0xe, 0x7) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = fcntl$getown(r0, 0x9) r3 = getpgid(r2) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r5 = socket$inet6(0xa, 0x6, 0x3) ioctl(r5, 0x5a, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f0000000680)="eb3c130105a4874e97bfeb58906d6b66732e6461740002", 0x17}], 0x1010802, 0x0) r6 = open(&(0x7f00000005c0)='./file0\x00', 0x4, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) removexattr(&(0x7f0000000700)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYRES64=r4, @ANYRES16=r2]) perf_event_open(&(0x7f0000940000)={0x2, 0xfffffffffffffdcd, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x2000000, 0x110, r1, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r3) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x89, 0x3, 0xca, 0xca30}) r8 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e, 0x0, 0x0, 0x4}, 0x0, 0x0, r7, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x1, 0x80000000, 0x80, 0x1}, 0xc) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0xa2081, 0x0) write$cgroup_type(r9, &(0x7f0000000540)='threaded\x00', 0xfffffffffffffea1) mkdirat(r6, &(0x7f00000004c0)='./file1\x00', 0x100000000) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) fchdir(r8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000500)=[{0x8000, 0x1, 0x6, 0x2}, {0x1, 0xc3dd, 0x8a, 0x9}, {0x5, 0x3ff, 0x0, 0x6}]}) fstatfs(r6, &(0x7f0000000400)=""/128) 04:09:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xf7, 0x0, 0x0, 0x2}}, 0x68) 04:09:24 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2000cf5c, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:24 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa0800450200640000000000889078ac2314bbac141400040490780000000000000000000000ac2314aaac161400083400000000000000800000e000000001000000"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x200, 0x0) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\'', 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x78, 0x0, 0x0, [{0x1, 0x188, 0xf, 0x100, '/dev/dlm_plock\x00'}, {0x0, 0x400, 0x1, 0x0, ','}, {0x0, 0x6, 0x3, 0x0, 'syz'}]}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000bc0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) eventfd(0x8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80785659, 0x0) 04:09:24 executing program 3: ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)) [ 1868.282638] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1868.365795] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x200, 0x0) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\'', 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x78, 0x0, 0x0, [{0x1, 0x188, 0xf, 0x0, '/dev/dlm_plock\x00'}, {0x0, 0x400, 0x1, 0x0, ','}, {0x0, 0x6, 0x3, 0x0, 'syz'}]}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000bc0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) eventfd(0x8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80785659, 0x0) 04:09:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08005f00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:24 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2000cf62, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1868.543276] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 1868.581275] FAT-fs (loop1): Filesystem has been set read-only [ 1868.666717] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:24 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa0800450200640000000000889078ac2314bbac141400040490780000000000000000000000ac2314aaac161400083400000000000000800000e000000001000000"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\'', 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x78, 0x0, 0x0, [{0x1, 0x188, 0xf, 0x100, '/dev/dlm_plock\x00'}, {0x0, 0x400, 0x1, 0x0, ','}, {0x0, 0x6, 0x3, 0x0, 'syz'}]}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000bc0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) eventfd(0x8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80785659, 0x0) [ 1868.734750] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) 04:09:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080e6c00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xf7, 0x0, 0x3, 0x2}}, 0x68) [ 1869.007523] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1869.049285] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 1869.077830] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a00)='./file0/file0\x00', 0x0) ftruncate(r1, 0x3) 04:09:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x30) 04:09:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) fremovexattr(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x80002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) futimesat(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:09:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080e7400030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:09:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) [ 1869.542127] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1869.591213] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x30) [ 1869.894307] net_ratelimit: 28 callbacks suppressed [ 1869.894316] protocol 88fb is buggy, dev hsr_slave_0 [ 1869.904679] protocol 88fb is buggy, dev hsr_slave_1 [ 1870.134196] protocol 88fb is buggy, dev hsr_slave_0 [ 1870.139360] protocol 88fb is buggy, dev hsr_slave_1 [ 1870.784193] protocol 88fb is buggy, dev hsr_slave_0 [ 1870.789421] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.094328] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.099648] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.155343] device bridge_slave_1 left promiscuous mode [ 1871.160856] bridge0: port 2(bridge_slave_1) entered disabled state [ 1871.215077] device bridge_slave_0 left promiscuous mode [ 1871.220751] bridge0: port 1(bridge_slave_0) entered disabled state [ 1871.254230] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.259483] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.364286] device hsr_slave_1 left promiscuous mode [ 1871.431283] device hsr_slave_0 left promiscuous mode [ 1871.479908] team0 (unregistering): Port device team_slave_1 removed [ 1871.495741] team0 (unregistering): Port device team_slave_0 removed [ 1871.506344] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1871.548831] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1871.616074] bond0 (unregistering): Released all slaves [ 1871.665755] IPVS: ftp: loaded support on port[0] = 21 [ 1871.739374] chnl_net:caif_netlink_parms(): no params data found [ 1871.773721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1871.780320] bridge0: port 1(bridge_slave_0) entered disabled state [ 1871.788025] device bridge_slave_0 entered promiscuous mode [ 1871.795743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1871.802227] bridge0: port 2(bridge_slave_1) entered disabled state [ 1871.809405] device bridge_slave_1 entered promiscuous mode [ 1871.830234] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1871.839680] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1871.861170] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1871.868965] team0: Port device team_slave_0 added [ 1871.875189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1871.882644] team0: Port device team_slave_1 added [ 1871.888160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1871.895909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1871.957753] device hsr_slave_0 entered promiscuous mode [ 1871.994456] device hsr_slave_1 entered promiscuous mode [ 1872.034847] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1872.042397] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1872.094799] bridge0: port 2(bridge_slave_1) entered blocking state [ 1872.101380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1872.108216] bridge0: port 1(bridge_slave_0) entered blocking state [ 1872.114925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1872.153438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1872.162613] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1872.176388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1872.185364] bridge0: port 1(bridge_slave_0) entered disabled state [ 1872.192569] bridge0: port 2(bridge_slave_1) entered disabled state [ 1872.206500] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1872.212612] 8021q: adding VLAN 0 to HW filter on device team0 [ 1872.225532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1872.233533] bridge0: port 1(bridge_slave_0) entered blocking state [ 1872.240004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1872.257478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1872.265861] bridge0: port 2(bridge_slave_1) entered blocking state [ 1872.272685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1872.307093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1872.326884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1872.339195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1872.351541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1872.362453] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1872.369053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1872.376928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1872.394030] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1872.411457] 8021q: adding VLAN 0 to HW filter on device batadv0 04:09:28 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001900)={0x0, 0xf0ffffff00000000, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/145, 0x91}, {&(0x7f0000000380)=""/5, 0x20000385}], 0x2}, 0x0) 04:09:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x12, 0x1]}) 04:09:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a080ea400030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)={0x2000000000000012}) 04:09:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x30) 04:09:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08a4cf00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:28 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x2, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000000c0), 0x1) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r2 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x8007ffc) sendfile(r1, r2, 0x0, 0xffff) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 04:09:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) 04:09:28 executing program 3: fremovexattr(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:09:28 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08000300030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:29 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x7}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000380)={0x94}) [ 1873.110978] nla_parse: 6 callbacks suppressed [ 1873.110989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:29 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f000038a000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f00002ba000/0x3000)=nil) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x8) [ 1873.221044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) 04:09:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 04:09:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08000a00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000040), 0x62, 0x0) 04:09:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x8}, 0x0, 0x400) [ 1873.563295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1873.604758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x8}, 0x0, 0x1400) 04:09:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08001100030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) preadv(r0, 0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:09:29 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) [ 1873.886946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1873.976948] audit: type=1804 audit(14970.028:13844): pid=28238 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir932203146/syzkaller.uDltuP/235/file0" dev="sda1" ino=16669 res=1 [ 1874.031051] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1874.934189] net_ratelimit: 24 callbacks suppressed [ 1874.934198] protocol 88fb is buggy, dev hsr_slave_0 [ 1874.944339] protocol 88fb is buggy, dev hsr_slave_1 [ 1875.254535] protocol 88fb is buggy, dev hsr_slave_0 [ 1875.259817] protocol 88fb is buggy, dev hsr_slave_1 [ 1875.414185] protocol 88fb is buggy, dev hsr_slave_0 [ 1875.419350] protocol 88fb is buggy, dev hsr_slave_1 [ 1875.504284] protocol 88fb is buggy, dev hsr_slave_0 [ 1875.509549] protocol 88fb is buggy, dev hsr_slave_1 [ 1875.545234] device bridge_slave_1 left promiscuous mode [ 1875.550824] bridge0: port 2(bridge_slave_1) entered disabled state [ 1875.595792] device bridge_slave_0 left promiscuous mode [ 1875.601774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1875.739573] device hsr_slave_1 left promiscuous mode [ 1875.797728] device hsr_slave_0 left promiscuous mode [ 1875.837853] team0 (unregistering): Port device team_slave_1 removed [ 1875.850658] team0 (unregistering): Port device team_slave_0 removed [ 1875.860836] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1875.909534] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1875.976592] bond0 (unregistering): Released all slaves [ 1876.052893] IPVS: ftp: loaded support on port[0] = 21 [ 1876.123954] chnl_net:caif_netlink_parms(): no params data found [ 1876.134270] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.139683] protocol 88fb is buggy, dev hsr_slave_1 [ 1876.176805] bridge0: port 1(bridge_slave_0) entered blocking state [ 1876.183601] bridge0: port 1(bridge_slave_0) entered disabled state [ 1876.191012] device bridge_slave_0 entered promiscuous mode [ 1876.198994] bridge0: port 2(bridge_slave_1) entered blocking state [ 1876.205455] bridge0: port 2(bridge_slave_1) entered disabled state [ 1876.212515] device bridge_slave_1 entered promiscuous mode [ 1876.233900] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1876.243742] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1876.265064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1876.272536] team0: Port device team_slave_0 added [ 1876.314691] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1876.322602] team0: Port device team_slave_1 added [ 1876.328264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1876.335956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1876.397536] device hsr_slave_0 entered promiscuous mode [ 1876.440784] device hsr_slave_1 entered promiscuous mode [ 1876.521136] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1876.528750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1876.562640] bridge0: port 2(bridge_slave_1) entered blocking state [ 1876.569318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1876.576462] bridge0: port 1(bridge_slave_0) entered blocking state [ 1876.582871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1876.671534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1876.689901] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1876.710537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1876.722823] bridge0: port 1(bridge_slave_0) entered disabled state [ 1876.733625] bridge0: port 2(bridge_slave_1) entered disabled state [ 1876.757269] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1876.763381] 8021q: adding VLAN 0 to HW filter on device team0 [ 1876.782260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1876.798405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1876.804971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1876.830606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1876.847241] bridge0: port 2(bridge_slave_1) entered blocking state [ 1876.853651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1876.890313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1876.902634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1876.918400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1876.939061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1876.950693] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1876.957512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1876.965605] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1876.973194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1876.990021] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1877.009073] 8021q: adding VLAN 0 to HW filter on device batadv0 04:09:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 04:09:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2000000008004, 0x0, 0x0) 04:09:33 executing program 2: 04:09:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08002f00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:33 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xc}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:33 executing program 3: 04:09:33 executing program 3: 04:09:33 executing program 5: 04:09:33 executing program 2: [ 1877.299877] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1877.321339] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08003500030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:33 executing program 3: 04:09:33 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xf}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1877.517984] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1877.543841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/52) 04:09:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123d319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) clone(0x8401fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000300)='gfs2meta\x00', 0x0, 0x0) 04:09:33 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x8401fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB='/'], 0x0, &(0x7f0000000300)='gfs2meta\x00', 0x0, 0x0) 04:09:33 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:09:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08005f00030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:33 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x10}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:34 executing program 5: lsetxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000440)='y\x00', 0x2, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', 0x0, 0x0, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000280)={'syz_tun\x00', {0x2, 0x4e22, @empty}}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) 04:09:34 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(0x0, 0x840, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:09:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a0800240e030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:34 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1878.189070] nla_parse: 4 callbacks suppressed [ 1878.189079] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:34 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:09:34 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1261319bd070") ftruncate(r0, 0x8003f1) write$P9_RMKNOD(r0, &(0x7f00000001c0)={0x14}, 0x14) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000280)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000ffdf"]) [ 1878.255437] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a0800500e030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:34 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 1878.459725] audit: type=1804 audit(14974.508:13845): pid=28508 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir202117916/syzkaller.QpUDJz/766/bus" dev="sda1" ino=17554 res=1 [ 1878.529323] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x4, 0x101}, 0x2c) [ 1878.570656] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:34 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:09:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08006c0e030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1878.735890] device bridge_slave_1 left promiscuous mode [ 1878.741478] bridge0: port 2(bridge_slave_1) entered disabled state [ 1878.825678] device bridge_slave_0 left promiscuous mode [ 1878.831343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1878.861983] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1879.097972] device hsr_slave_1 left promiscuous mode [ 1879.159447] device hsr_slave_0 left promiscuous mode [ 1879.201189] team0 (unregistering): Port device team_slave_1 removed [ 1879.216201] team0 (unregistering): Port device team_slave_0 removed [ 1879.230789] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1879.280793] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1879.362020] bond0 (unregistering): Released all slaves [ 1879.400900] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1880.304229] net_ratelimit: 26 callbacks suppressed [ 1880.304238] protocol 88fb is buggy, dev hsr_slave_0 [ 1880.314706] protocol 88fb is buggy, dev hsr_slave_1 [ 1880.415662] IPVS: ftp: loaded support on port[0] = 21 [ 1880.520417] chnl_net:caif_netlink_parms(): no params data found [ 1880.560017] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.566803] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.573870] device bridge_slave_0 entered promiscuous mode [ 1880.581170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.588043] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.595659] device bridge_slave_1 entered promiscuous mode [ 1880.619443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1880.629367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1880.651058] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1880.659063] team0: Port device team_slave_0 added [ 1880.665801] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1880.673580] team0: Port device team_slave_1 added [ 1880.679319] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1880.687130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1880.746208] device hsr_slave_0 entered promiscuous mode [ 1880.784551] device hsr_slave_1 entered promiscuous mode [ 1880.824786] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1880.832533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1880.847218] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.853876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1880.860844] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.867426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1880.906295] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1880.912518] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1880.921956] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1880.932604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1880.940165] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.947360] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.955616] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1880.967921] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1880.974594] 8021q: adding VLAN 0 to HW filter on device team0 [ 1880.983799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1880.991589] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.997974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1881.009973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1881.017953] bridge0: port 2(bridge_slave_1) entered blocking state [ 1881.024382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1881.041557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1881.055982] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1881.063551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1881.079896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1881.091491] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1881.103106] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1881.110055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1881.118492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1881.133788] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1881.145396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1881.174254] protocol 88fb is buggy, dev hsr_slave_0 [ 1881.179372] protocol 88fb is buggy, dev hsr_slave_1 [ 1881.224226] protocol 88fb is buggy, dev hsr_slave_0 [ 1881.229460] protocol 88fb is buggy, dev hsr_slave_1 04:09:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000140)="4c6b705378f62fbb77") ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet(0x2, 0x4040000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0xffb, 0x15a) bind$inet(r2, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto(r2, &(0x7f0000000280)="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", 0xffc, 0x81, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001440)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x400100) 04:09:37 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x11b400, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) semget$private(0x0, 0x1, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000240)='syz', 0xffffffffffffffff) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000003e0001002bbd7000ffdbd1250a000000"], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000300)=0x7ff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x5, @ipv4={[], [], @rand_addr=0x100}, 0x1}, 0x1c) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 04:09:37 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x14}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a0800740e030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 04:09:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x0, 0x0) [ 1881.344181] protocol 88fb is buggy, dev hsr_slave_0 [ 1881.349627] protocol 88fb is buggy, dev hsr_slave_1 [ 1881.362729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:37 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000440)='y\x00', 0x2, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={'syz_tun\x00', {0x2, 0x4e22, @empty}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 1881.421095] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:37 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x15}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1881.464265] protocol 88fb is buggy, dev hsr_slave_0 [ 1881.469561] protocol 88fb is buggy, dev hsr_slave_1 04:09:37 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(0x0, 0x0) 04:09:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a0800a40e030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:37 executing program 1: lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) mknod(0x0, 0x840, 0x5) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:09:37 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, 0x0}) [ 1881.678883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1881.714886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1882.014786] device bridge_slave_1 left promiscuous mode [ 1882.020388] bridge0: port 2(bridge_slave_1) entered disabled state [ 1882.065381] device bridge_slave_0 left promiscuous mode [ 1882.071081] bridge0: port 1(bridge_slave_0) entered disabled state [ 1882.198049] device hsr_slave_1 left promiscuous mode [ 1882.230320] device hsr_slave_0 left promiscuous mode [ 1882.278043] team0 (unregistering): Port device team_slave_1 removed [ 1882.292158] team0 (unregistering): Port device team_slave_0 removed [ 1882.302056] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1882.348137] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1882.436170] bond0 (unregistering): Released all slaves 04:09:38 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, 0x0}) 04:09:38 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="17200000000000000001000000ba76e1d9c3e6f67e0dcd69672527"]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x17}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:09:38 executing program 3: syz_execute_func(&(0x7f0000000280)="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") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") 04:09:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a0800cfa4030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:09:38 executing program 2: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x11b400, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) semget$private(0x0, 0x1, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000240)='syz', 0xffffffffffffffff) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[]}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000340)={0x0, 0x2}) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000300)=0x7ff) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) 04:09:38 executing program 1: lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) mknod(0x0, 0x840, 0x5) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 1882.583510] WARNING: CPU: 1 PID: 9643 at net/batman-adv/multicast.c:371 batadv_mcast_mla_update+0x1927/0x1ec0 [ 1882.594352] Kernel panic - not syncing: panic_on_warn set ... [ 1882.594352] [ 1882.601748] CPU: 1 PID: 9643 Comm: kworker/u4:10 Not tainted 4.19.37 #5 [ 1882.608508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1882.617980] Workqueue: bat_events batadv_mcast_mla_update [ 1882.623543] Call Trace: [ 1882.626935] dump_stack+0x172/0x1f0 [ 1882.630591] panic+0x263/0x51d [ 1882.633809] ? __warn_printk+0xf3/0xf3 [ 1882.637832] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 1882.642951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.648510] ? __warn.cold+0x5/0x54 [ 1882.652175] ? __warn+0xe8/0x1d0 [ 1882.655588] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 1882.660717] __warn.cold+0x20/0x54 [ 1882.664544] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 1882.669686] report_bug+0x263/0x2b0 [ 1882.673360] do_error_trap+0x204/0x360 [ 1882.677272] ? math_error+0x340/0x340 [ 1882.681105] ? error_entry+0x76/0xd0 [ 1882.684870] ? trace_hardirqs_off_caller+0x65/0x220 [ 1882.690103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1882.694970] do_invalid_op+0x1b/0x20 [ 1882.698720] invalid_op+0x14/0x20 [ 1882.702192] RIP: 0010:batadv_mcast_mla_update+0x1927/0x1ec0 [ 1882.708037] Code: 00 0f 85 95 05 00 00 4c 3b ad d0 fe ff ff 4c 89 ef 4d 8b 65 00 0f 85 a0 fb ff ff e8 63 42 98 fa e9 a6 ef ff ff e8 59 42 98 fa <0f> 0b e9 64 ec ff ff e8 4d 42 98 fa 8b b5 a8 fe ff ff 31 ff e8 c0 [ 1882.727161] RSP: 0018:ffff88804f427bc0 EFLAGS: 00010293 [ 1882.732542] RAX: ffff88804fb84080 RBX: 0000000000000001 RCX: ffffffff86d2f189 [ 1882.739918] RDX: 0000000000000000 RSI: ffffffff86d30527 RDI: 0000000000000007 [ 1882.747213] RBP: ffff88804f427d30 R08: ffff88804fb84080 R09: ffff88804fb84948 [ 1882.754521] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88804f427c98 [ 1882.761937] R13: ffff88808e131b50 R14: 0000000000000000 R15: ffff88804f427d08 [ 1882.769276] ? batadv_mcast_mla_update+0x589/0x1ec0 [ 1882.774412] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 1882.779580] ? check_memory_region+0x100/0x190 [ 1882.784463] ? batadv_mcast_querier_log.isra.0+0x140/0x140 [ 1882.790141] process_one_work+0x98e/0x1760 [ 1882.794418] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1882.799264] ? lock_acquire+0x16f/0x3f0 [ 1882.803274] ? kasan_check_write+0x14/0x20 [ 1882.807545] ? do_raw_spin_lock+0xc8/0x240 [ 1882.811813] worker_thread+0x98/0xe40 [ 1882.815644] kthread+0x357/0x430 [ 1882.819036] ? process_one_work+0x1760/0x1760 [ 1882.823578] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1882.829099] ret_from_fork+0x3a/0x50 [ 1882.834002] Kernel Offset: disabled [ 1882.837947] Rebooting in 86400 seconds..