[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[ 60.362363][ T26] audit: type=1800 audit(1563053324.656:25): pid=9008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0
[ 60.389554][ T26] audit: type=1800 audit(1563053324.656:26): pid=9008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[ 60.436444][ T26] audit: type=1800 audit(1563053324.656:27): pid=9008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
Debian GNU/Linux 7 syzkaller ttyS0
Warning: Permanently added '10.128.10.58' (ECDSA) to the list of known hosts.
2019/07/13 21:28:52 fuzzer started
2019/07/13 21:28:55 dialing manager at 10.128.0.26:37019
2019/07/13 21:28:55 checking machine...
2019/07/13 21:28:55 checking revisions...
2019/07/13 21:28:55 testing simple program...
syzkaller login: [ 71.470644][ T9177] IPVS: ftp: loaded support on port[0] = 21
2019/07/13 21:28:55 building call list...
[ 72.768254][ T9164] can: request_module (can-proto-0) failed.
[ 73.278174][ T9164] can: request_module (can-proto-0) failed.
2019/07/13 21:29:01 syscalls: 2465
2019/07/13 21:29:01 code coverage: enabled
2019/07/13 21:29:01 comparison tracing: enabled
2019/07/13 21:29:01 extra coverage: extra coverage is not supported by the kernel
2019/07/13 21:29:01 setuid sandbox: enabled
2019/07/13 21:29:01 namespace sandbox: enabled
2019/07/13 21:29:01 Android sandbox: /sys/fs/selinux/policy does not exist
2019/07/13 21:29:01 fault injection: enabled
2019/07/13 21:29:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/07/13 21:29:01 net packet injection: enabled
2019/07/13 21:29:01 net device setup: enabled
21:29:02 executing program 0:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 78.630088][ T9220] IPVS: ftp: loaded support on port[0] = 21
21:29:03 executing program 1:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 78.775349][ T9220] chnl_net:caif_netlink_parms(): no params data found
[ 78.880882][ T9220] bridge0: port 1(bridge_slave_0) entered blocking state
[ 78.888742][ T9220] bridge0: port 1(bridge_slave_0) entered disabled state
[ 78.896990][ T9220] device bridge_slave_0 entered promiscuous mode
[ 78.918764][ T9220] bridge0: port 2(bridge_slave_1) entered blocking state
[ 78.925935][ T9220] bridge0: port 2(bridge_slave_1) entered disabled state
[ 78.935000][ T9220] device bridge_slave_1 entered promiscuous mode
[ 78.951448][ T9223] IPVS: ftp: loaded support on port[0] = 21
[ 79.005431][ T9220] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 79.023218][ T9220] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
21:29:03 executing program 2:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
[ 79.071494][ T9220] team0: Port device team_slave_0 added
[ 79.096012][ T9220] team0: Port device team_slave_1 added
[ 79.250836][ T9220] device hsr_slave_0 entered promiscuous mode
21:29:03 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20)
[ 79.347841][ T9220] device hsr_slave_1 entered promiscuous mode
[ 79.414825][ T9223] chnl_net:caif_netlink_parms(): no params data found
[ 79.430944][ T9226] IPVS: ftp: loaded support on port[0] = 21
[ 79.453899][ T9220] bridge0: port 2(bridge_slave_1) entered blocking state
[ 79.461360][ T9220] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 79.469542][ T9220] bridge0: port 1(bridge_slave_0) entered blocking state
[ 79.476679][ T9220] bridge0: port 1(bridge_slave_0) entered forwarding state
21:29:03 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
[ 79.670887][ T9223] bridge0: port 1(bridge_slave_0) entered blocking state
[ 79.687472][ T9223] bridge0: port 1(bridge_slave_0) entered disabled state
[ 79.689805][ T9229] IPVS: ftp: loaded support on port[0] = 21
[ 79.718387][ T9223] device bridge_slave_0 entered promiscuous mode
[ 79.730825][ T9223] bridge0: port 2(bridge_slave_1) entered blocking state
[ 79.747546][ T9223] bridge0: port 2(bridge_slave_1) entered disabled state
[ 79.767451][ T9223] device bridge_slave_1 entered promiscuous mode
[ 79.800733][ T9231] IPVS: ftp: loaded support on port[0] = 21
[ 79.821990][ T22] bridge0: port 1(bridge_slave_0) entered disabled state
[ 79.830993][ T22] bridge0: port 2(bridge_slave_1) entered disabled state
[ 79.864324][ T9220] 8021q: adding VLAN 0 to HW filter on device bond0
[ 79.915455][ T9223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 79.962932][ T9223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 79.992540][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 80.008499][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
21:29:04 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238)
[ 80.055300][ T9220] 8021q: adding VLAN 0 to HW filter on device team0
[ 80.157517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 80.166879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 80.176115][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 80.183239][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 80.190954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 80.199917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 80.208498][ T12] bridge0: port 2(bridge_slave_1) entered blocking state
[ 80.215612][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 80.254706][ T9229] chnl_net:caif_netlink_parms(): no params data found
[ 80.266560][ T9223] team0: Port device team_slave_0 added
[ 80.275115][ T9223] team0: Port device team_slave_1 added
[ 80.292265][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 80.306601][ T9226] chnl_net:caif_netlink_parms(): no params data found
[ 80.340979][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 80.372028][ T9235] IPVS: ftp: loaded support on port[0] = 21
[ 80.420940][ T9223] device hsr_slave_0 entered promiscuous mode
[ 80.467804][ T9223] device hsr_slave_1 entered promiscuous mode
[ 80.507517][ T9223] debugfs: Directory 'hsr0' with parent '/' already present!
[ 80.585254][ T9229] bridge0: port 1(bridge_slave_0) entered blocking state
[ 80.595410][ T9229] bridge0: port 1(bridge_slave_0) entered disabled state
[ 80.603465][ T9229] device bridge_slave_0 entered promiscuous mode
[ 80.636854][ T9231] chnl_net:caif_netlink_parms(): no params data found
[ 80.646871][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 80.657569][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 80.666274][ T9229] bridge0: port 2(bridge_slave_1) entered blocking state
[ 80.674091][ T9229] bridge0: port 2(bridge_slave_1) entered disabled state
[ 80.682054][ T9229] device bridge_slave_1 entered promiscuous mode
[ 80.704721][ T9226] bridge0: port 1(bridge_slave_0) entered blocking state
[ 80.711882][ T9226] bridge0: port 1(bridge_slave_0) entered disabled state
[ 80.721612][ T9226] device bridge_slave_0 entered promiscuous mode
[ 80.729818][ T9226] bridge0: port 2(bridge_slave_1) entered blocking state
[ 80.736893][ T9226] bridge0: port 2(bridge_slave_1) entered disabled state
[ 80.745210][ T9226] device bridge_slave_1 entered promiscuous mode
[ 80.759856][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 80.769617][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 80.778602][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 80.805094][ T9229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 80.830477][ T9226] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 80.868622][ T9229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 80.882804][ T9226] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 80.914161][ T9231] bridge0: port 1(bridge_slave_0) entered blocking state
[ 80.922705][ T9231] bridge0: port 1(bridge_slave_0) entered disabled state
[ 80.930741][ T9231] device bridge_slave_0 entered promiscuous mode
[ 80.970278][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 80.979777][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 80.989137][ T9231] bridge0: port 2(bridge_slave_1) entered blocking state
[ 80.996310][ T9231] bridge0: port 2(bridge_slave_1) entered disabled state
[ 81.004863][ T9231] device bridge_slave_1 entered promiscuous mode
[ 81.019789][ T9226] team0: Port device team_slave_0 added
[ 81.030725][ T9229] team0: Port device team_slave_0 added
[ 81.038507][ T9229] team0: Port device team_slave_1 added
[ 81.057853][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 81.066635][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 81.099593][ T9226] team0: Port device team_slave_1 added
[ 81.107890][ T9220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 81.128293][ T9231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 81.210435][ T9226] device hsr_slave_0 entered promiscuous mode
[ 81.247894][ T9226] device hsr_slave_1 entered promiscuous mode
[ 81.297535][ T9226] debugfs: Directory 'hsr0' with parent '/' already present!
[ 81.307943][ T9231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 81.381311][ T9229] device hsr_slave_0 entered promiscuous mode
[ 81.438000][ T9229] device hsr_slave_1 entered promiscuous mode
[ 81.477515][ T9229] debugfs: Directory 'hsr0' with parent '/' already present!
[ 81.490829][ T9220] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 81.519232][ T9235] chnl_net:caif_netlink_parms(): no params data found
[ 81.585556][ T9231] team0: Port device team_slave_0 added
[ 81.608359][ T9223] 8021q: adding VLAN 0 to HW filter on device bond0
[ 81.626322][ T9235] bridge0: port 1(bridge_slave_0) entered blocking state
[ 81.636487][ T9235] bridge0: port 1(bridge_slave_0) entered disabled state
[ 81.645728][ T9235] device bridge_slave_0 entered promiscuous mode
[ 81.655998][ T9231] team0: Port device team_slave_1 added
[ 81.681083][ T9235] bridge0: port 2(bridge_slave_1) entered blocking state
[ 81.688382][ T9235] bridge0: port 2(bridge_slave_1) entered disabled state
[ 81.696173][ T9235] device bridge_slave_1 entered promiscuous mode
[ 81.770852][ T9231] device hsr_slave_0 entered promiscuous mode
[ 81.807888][ T9231] device hsr_slave_1 entered promiscuous mode
[ 81.847496][ T9231] debugfs: Directory 'hsr0' with parent '/' already present!
[ 81.876363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 81.884801][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 81.898022][ T9223] 8021q: adding VLAN 0 to HW filter on device team0
[ 81.932300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 81.941709][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 81.950430][ T17] bridge0: port 1(bridge_slave_0) entered blocking state
[ 81.957575][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 81.966575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 82.003622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 82.014440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 82.023535][ T17] bridge0: port 2(bridge_slave_1) entered blocking state
[ 82.030704][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 82.039941][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
21:29:06 executing program 0:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 82.073334][ T9235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
21:29:06 executing program 0:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 82.161019][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 82.176635][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 82.186416][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 82.206724][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 82.217727][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 82.226367][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 82.235678][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
21:29:06 executing program 0:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 82.254763][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 82.263860][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 82.284517][ T9235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 82.325762][ T9226] 8021q: adding VLAN 0 to HW filter on device bond0
[ 82.341426][ T9223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
21:29:06 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
[ 82.380571][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 82.419420][ T9229] 8021q: adding VLAN 0 to HW filter on device bond0
[ 82.444391][ T9223] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 82.501102][ C0] hrtimer: interrupt took 37053 ns
[ 82.512540][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 82.529354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 82.545100][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 82.553630][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 82.574746][ T9226] 8021q: adding VLAN 0 to HW filter on device team0
[ 82.601805][ T9235] team0: Port device team_slave_0 added
[ 82.619410][ T9229] 8021q: adding VLAN 0 to HW filter on device team0
[ 82.658978][ T9235] team0: Port device team_slave_1 added
[ 82.673998][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 82.693944][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 82.703429][ T9237] bridge0: port 1(bridge_slave_0) entered blocking state
[ 82.710900][ T9237] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 82.732506][ T9231] 8021q: adding VLAN 0 to HW filter on device bond0
[ 82.766498][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 82.775281][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 82.789531][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 82.803347][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state
[ 82.810513][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 82.826040][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 82.835905][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 82.852083][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 82.860839][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state
[ 82.867962][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 82.875801][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 82.884954][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 82.907923][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state
[ 82.915086][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 82.923368][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 82.932411][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 82.965533][ T9231] 8021q: adding VLAN 0 to HW filter on device team0
21:29:07 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
[ 83.037875][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 83.045966][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 83.094344][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 83.125389][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
21:29:07 executing program 1:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 83.146692][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 83.164004][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 83.173762][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 83.188406][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 83.202504][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 83.211470][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 83.229403][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
21:29:07 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
[ 83.262934][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 83.272342][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 83.280820][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
21:29:07 executing program 1:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
[ 83.372070][ T9235] device hsr_slave_0 entered promiscuous mode
[ 83.429467][ T9235] device hsr_slave_1 entered promiscuous mode
[ 83.477755][ T9235] debugfs: Directory 'hsr0' with parent '/' already present!
[ 83.508929][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 83.527069][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 83.536405][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 83.545530][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 83.554986][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 83.564053][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 83.572706][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 83.581500][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 83.590387][ T9228] bridge0: port 1(bridge_slave_0) entered blocking state
[ 83.597535][ T9228] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 83.605198][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 83.614666][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 83.623227][ T9228] bridge0: port 2(bridge_slave_1) entered blocking state
[ 83.630351][ T9228] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 83.638836][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 83.650022][ T9229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 83.669785][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 83.677999][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 83.694736][ T9226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 83.706954][ T9226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 83.728398][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 83.736932][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 83.764440][ T9231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 83.775591][ T9231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 83.798775][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 83.808350][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 83.816713][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 83.826989][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 83.836314][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 83.844896][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 83.853885][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 83.862651][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 83.871521][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 83.879752][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 83.920815][ T9229] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 83.933612][ T9231] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 83.962164][ T9226] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 84.005335][ T9235] 8021q: adding VLAN 0 to HW filter on device bond0
[ 84.036485][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 84.053077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 84.070792][ T9235] 8021q: adding VLAN 0 to HW filter on device team0
[ 84.104040][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 84.119340][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 84.155267][ T22] bridge0: port 1(bridge_slave_0) entered blocking state
[ 84.162434][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 84.217714][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 84.225951][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 84.244796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 84.255040][ T17] bridge0: port 2(bridge_slave_1) entered blocking state
[ 84.262314][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 84.272883][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 84.312490][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 84.329666][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 84.360524][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 84.370053][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 84.379774][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 84.389234][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 84.406035][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 84.414745][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 84.423879][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 84.434592][ T9235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 84.449842][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
21:29:08 executing program 2:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
[ 84.505337][ T9235] 8021q: adding VLAN 0 to HW filter on device batadv0
21:29:08 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:08 executing program 1:
syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0)
21:29:09 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238)
21:29:09 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20)
21:29:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 1:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
21:29:09 executing program 2:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
21:29:09 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 2:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
21:29:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 1:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
21:29:09 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20)
21:29:09 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238)
21:29:09 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20)
21:29:09 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 1:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0)
21:29:09 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238)
21:29:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:09 executing program 1:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:09 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:10 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:10 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:10 executing program 5:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:10 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0)
fsmount(r1, 0x0, 0x6)
21:29:10 executing program 1:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 2:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 5:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 4:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 3:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 1:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 2:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:10 executing program 5:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 4:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 1:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 3:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 5:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 2:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 1:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 3:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 2:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:11 executing program 5:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 4:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 0:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 1:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 3:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 2:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 5:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 4:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 0:
fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe)
21:29:12 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
21:29:12 executing program 2:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 3:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:12 executing program 5:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
21:29:12 executing program 0:
fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe)
[ 88.611750][ T9618] overlayfs: overlapping lowerdir path
21:29:13 executing program 4:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
[ 88.711453][ T9618] overlayfs: overlapping lowerdir path
21:29:13 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
21:29:13 executing program 5:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
21:29:13 executing program 0:
fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe)
21:29:13 executing program 2:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
21:29:13 executing program 3:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
21:29:13 executing program 4:
ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0)
socket$inet(0x2, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2)
poll(0x0, 0x0, 0x0)
rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00')
sync()
[ 89.051283][ T9649] overlayfs: overlapping lowerdir path
21:29:13 executing program 5:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
21:29:13 executing program 2:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
21:29:13 executing program 0:
fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe)
21:29:13 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
21:29:13 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
[ 89.390555][ T9678] overlayfs: overlapping lowerdir path
21:29:13 executing program 5:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
21:29:13 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
21:29:13 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]})
21:29:13 executing program 2:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
creat(&(0x7f0000000600)='./file0/file0\x00', 0x0)
[ 89.560449][ T9685] overlayfs: overlapping lowerdir path
21:29:13 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
21:29:14 executing program 5:
fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0)
21:29:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]})
[ 89.743894][ T9697] overlayfs: overlapping lowerdir path
21:29:14 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
21:29:14 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
21:29:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]})
21:29:14 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 89.939641][ T9702] ldm_validate_privheads(): Disk read failed.
[ 89.972610][ T9702] loop4: p1
21:29:14 executing program 5:
fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0)
[ 89.988382][ T9702] loop4: partition table partially beyond EOD, truncated
[ 90.019247][ T9711] overlayfs: overlapping lowerdir path
[ 90.053812][ T9702] loop4: p1 start 1 is beyond EOD, truncated
21:29:14 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
21:29:14 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0'])
21:29:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]})
21:29:14 executing program 5:
fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0)
21:29:14 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
21:29:14 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:14 executing program 5:
fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0)
[ 90.420595][ T9739] overlayfs: overlapping lowerdir path
21:29:14 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
21:29:14 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 90.479140][ T9745] ldm_validate_privheads(): Disk read failed.
[ 90.518392][ T9745] loop4: p1
[ 90.558643][ T9745] loop4: partition table partially beyond EOD, truncated
21:29:14 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 90.618286][ T9745] loop4: p1 start 1 is beyond EOD, truncated
21:29:15 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:15 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
21:29:15 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
21:29:15 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:15 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:15 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 90.998302][ T9771] ldm_validate_privheads(): Disk read failed.
[ 91.012315][ T9771] loop4: p1
[ 91.024785][ T9771] loop4: partition table partially beyond EOD, truncated
[ 91.079694][ T9771] loop4: p1 start 1 is beyond EOD, truncated
21:29:15 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
21:29:16 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 92.350992][ T9789] ldm_validate_privheads(): Disk read failed.
[ 92.378819][ T9789] loop4: p1
[ 92.382166][ T9789] loop4: partition table partially beyond EOD, truncated
[ 92.400270][ T9789] loop4: p1 start 1 is beyond EOD, truncated
21:29:16 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:16 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:17 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:17 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:17 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:17 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:17 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:17 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 93.519255][ T9802] IPVS: ftp: loaded support on port[0] = 21
[ 93.745116][ T9802] chnl_net:caif_netlink_parms(): no params data found
[ 93.775813][ T9802] bridge0: port 1(bridge_slave_0) entered blocking state
[ 93.783105][ T9802] bridge0: port 1(bridge_slave_0) entered disabled state
[ 93.791287][ T9802] device bridge_slave_0 entered promiscuous mode
[ 93.876012][ T9802] bridge0: port 2(bridge_slave_1) entered blocking state
[ 93.890594][ T9802] bridge0: port 2(bridge_slave_1) entered disabled state
[ 93.908549][ T9802] device bridge_slave_1 entered promiscuous mode
[ 94.191574][ T9802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 94.201614][ T9809] IPVS: ftp: loaded support on port[0] = 21
[ 94.216679][ T9808] IPVS: ftp: loaded support on port[0] = 21
[ 94.221763][ T9811] IPVS: ftp: loaded support on port[0] = 21
[ 94.232083][ T9810] IPVS: ftp: loaded support on port[0] = 21
[ 94.247911][ T9278] device hsr_slave_0 left promiscuous mode
[ 94.307544][ T9278] device hsr_slave_1 left promiscuous mode
[ 94.389347][ T9278] device bridge_slave_1 left promiscuous mode
[ 94.396114][ T9278] bridge0: port 2(bridge_slave_1) entered disabled state
[ 94.451020][ T9278] device bridge_slave_0 left promiscuous mode
[ 94.457219][ T9278] bridge0: port 1(bridge_slave_0) entered disabled state
[ 96.488107][ T9278] team0 (unregistering): Port device team_slave_1 removed
[ 96.502407][ T9278] team0 (unregistering): Port device team_slave_0 removed
[ 96.514358][ T9278] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 96.554246][ T9278] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 96.640225][ T9278] bond0 (unregistering): Released all slaves
[ 96.754468][ T9802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 96.784899][ T9802] team0: Port device team_slave_0 added
[ 96.796979][ T9802] team0: Port device team_slave_1 added
[ 96.910795][ T9802] device hsr_slave_0 entered promiscuous mode
[ 96.957933][ T9802] device hsr_slave_1 entered promiscuous mode
[ 96.997435][ T9802] debugfs: Directory 'hsr0' with parent '/' already present!
[ 97.169091][ T9809] chnl_net:caif_netlink_parms(): no params data found
[ 97.463998][ T9808] chnl_net:caif_netlink_parms(): no params data found
[ 97.572194][ T9802] 8021q: adding VLAN 0 to HW filter on device bond0
[ 97.616211][ T9809] bridge0: port 1(bridge_slave_0) entered blocking state
[ 97.633882][ T9809] bridge0: port 1(bridge_slave_0) entered disabled state
[ 97.646164][ T9809] device bridge_slave_0 entered promiscuous mode
[ 97.686792][ T9811] chnl_net:caif_netlink_parms(): no params data found
[ 97.712369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 97.728903][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 97.745811][ T9810] chnl_net:caif_netlink_parms(): no params data found
[ 97.781397][ T9809] bridge0: port 2(bridge_slave_1) entered blocking state
[ 97.796681][ T9809] bridge0: port 2(bridge_slave_1) entered disabled state
[ 97.805668][ T9809] device bridge_slave_1 entered promiscuous mode
[ 97.826114][ T9802] 8021q: adding VLAN 0 to HW filter on device team0
[ 97.919385][ T9808] bridge0: port 1(bridge_slave_0) entered blocking state
[ 97.926498][ T9808] bridge0: port 1(bridge_slave_0) entered disabled state
[ 97.949172][ T9808] device bridge_slave_0 entered promiscuous mode
[ 97.975093][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 97.985241][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 98.005402][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state
[ 98.012605][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 98.034045][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 98.054915][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 98.071251][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state
[ 98.078424][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 98.123988][ T9809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 98.142215][ T9808] bridge0: port 2(bridge_slave_1) entered blocking state
[ 98.151333][ T9808] bridge0: port 2(bridge_slave_1) entered disabled state
[ 98.159925][ T9808] device bridge_slave_1 entered promiscuous mode
[ 98.176719][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 98.185501][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 98.196440][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 98.208564][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 98.218100][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 98.240480][ T9809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 98.263334][ T9811] bridge0: port 1(bridge_slave_0) entered blocking state
[ 98.287817][ T9811] bridge0: port 1(bridge_slave_0) entered disabled state
[ 98.295989][ T9811] device bridge_slave_0 entered promiscuous mode
[ 98.319092][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 98.327103][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 98.348821][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 98.358010][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 98.366606][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 98.375095][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 98.383741][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 98.393581][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 98.431404][ T9811] bridge0: port 2(bridge_slave_1) entered blocking state
[ 98.438739][ T9811] bridge0: port 2(bridge_slave_1) entered disabled state
[ 98.446789][ T9811] device bridge_slave_1 entered promiscuous mode
[ 98.469378][ T9802] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 98.481679][ T9808] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 98.494624][ T9809] team0: Port device team_slave_0 added
[ 98.501877][ T9810] bridge0: port 1(bridge_slave_0) entered blocking state
[ 98.527205][ T9810] bridge0: port 1(bridge_slave_0) entered disabled state
[ 98.544390][ T9810] device bridge_slave_0 entered promiscuous mode
[ 98.564177][ T9808] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 98.574903][ T9809] team0: Port device team_slave_1 added
[ 98.581731][ T9810] bridge0: port 2(bridge_slave_1) entered blocking state
[ 98.592940][ T9810] bridge0: port 2(bridge_slave_1) entered disabled state
[ 98.601152][ T9810] device bridge_slave_1 entered promiscuous mode
[ 98.661829][ T9811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 98.675123][ T9811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 98.703916][ T9810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 98.714661][ T9808] team0: Port device team_slave_0 added
[ 98.771085][ T9809] device hsr_slave_0 entered promiscuous mode
[ 98.817912][ T9809] device hsr_slave_1 entered promiscuous mode
[ 98.857585][ T9809] debugfs: Directory 'hsr0' with parent '/' already present!
[ 98.888385][ T9810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 98.909019][ T9808] team0: Port device team_slave_1 added
[ 98.916903][ T9811] team0: Port device team_slave_0 added
[ 98.960995][ T9811] team0: Port device team_slave_1 added
21:29:23 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:23 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 99.040525][ T9808] device hsr_slave_0 entered promiscuous mode
[ 99.078858][ T9808] device hsr_slave_1 entered promiscuous mode
[ 99.117414][ T9808] debugfs: Directory 'hsr0' with parent '/' already present!
[ 99.135837][ T9810] team0: Port device team_slave_0 added
[ 99.149393][ T9810] team0: Port device team_slave_1 added
[ 99.410655][ T9811] device hsr_slave_0 entered promiscuous mode
21:29:23 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 99.488004][ T9811] device hsr_slave_1 entered promiscuous mode
[ 99.527397][ T9811] debugfs: Directory 'hsr0' with parent '/' already present!
21:29:23 executing program 1:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 99.661148][ T9810] device hsr_slave_0 entered promiscuous mode
[ 99.737877][ T9810] device hsr_slave_1 entered promiscuous mode
[ 99.807366][ T9810] debugfs: Directory 'hsr0' with parent '/' already present!
[ 99.903603][ T9809] 8021q: adding VLAN 0 to HW filter on device bond0
[ 99.923006][ T9808] 8021q: adding VLAN 0 to HW filter on device bond0
[ 99.988356][ T9809] 8021q: adding VLAN 0 to HW filter on device team0
[ 100.006250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 100.014645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 100.034164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 100.046657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 100.055869][ T5] bridge0: port 1(bridge_slave_0) entered blocking state
[ 100.063019][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 100.071411][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 100.079404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 100.093153][ T9808] 8021q: adding VLAN 0 to HW filter on device team0
[ 100.103923][ T9811] 8021q: adding VLAN 0 to HW filter on device bond0
[ 100.114810][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 100.127775][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 100.136795][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 100.146133][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state
[ 100.153309][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 100.166950][ T9810] 8021q: adding VLAN 0 to HW filter on device bond0
[ 100.229091][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 100.238630][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 100.254190][ T17] bridge0: port 1(bridge_slave_0) entered blocking state
[ 100.261291][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 100.269190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 100.278121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 100.286443][ T17] bridge0: port 2(bridge_slave_1) entered blocking state
[ 100.293547][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 100.301595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 100.310616][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 100.319855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 100.329032][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 100.336688][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 100.344808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 100.366796][ T9810] 8021q: adding VLAN 0 to HW filter on device team0
[ 100.377253][ T9811] 8021q: adding VLAN 0 to HW filter on device team0
[ 100.394934][ T9829] IPVS: ftp: loaded support on port[0] = 21
[ 101.453294][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 101.461639][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 101.470692][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 101.479583][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 101.487262][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 101.496288][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 101.506499][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 101.515131][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 101.524115][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 101.532896][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 101.541847][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 101.550871][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 101.559442][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 101.590114][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 101.605458][ T9831] IPVS: ftp: loaded support on port[0] = 21
[ 101.612288][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 101.620508][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 101.629437][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 101.638427][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 101.646782][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 101.655632][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 101.664945][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 101.673864][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state
[ 101.681008][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 101.689225][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 101.698084][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 101.706450][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state
[ 101.713580][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 101.724112][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 101.732643][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 101.740894][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 101.749256][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 102.268338][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 102.277066][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 102.286853][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state
[ 102.293995][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 102.302673][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 102.311810][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 102.320633][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 102.329163][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state
[ 102.336210][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 102.360641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 102.369683][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 102.378890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 102.388702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 102.398409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 102.406870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 102.415535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 102.428043][ T9809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 102.437675][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 102.447907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 102.456069][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 102.474369][ T9811] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 102.546269][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 102.554831][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 102.567043][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 103.079197][ T9809] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 103.108640][ T9808] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 103.167857][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 103.177919][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 103.195012][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 103.203975][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 103.212619][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 103.221144][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 103.229705][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 103.238321][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 103.247395][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 103.769463][ T9810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 103.800215][ T9811] 8021q: adding VLAN 0 to HW filter on device batadv0
21:29:28 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:29 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 104.833858][ T9810] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 105.091065][ T9831] chnl_net:caif_netlink_parms(): no params data found
21:29:29 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:29 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:30 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:30 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:30 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:30 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 106.970375][ T9831] bridge0: port 1(bridge_slave_0) entered blocking state
[ 106.977716][ T9831] bridge0: port 1(bridge_slave_0) entered disabled state
[ 106.985378][ T9831] device bridge_slave_0 entered promiscuous mode
[ 106.994595][ T9831] bridge0: port 2(bridge_slave_1) entered blocking state
[ 107.001793][ T9831] bridge0: port 2(bridge_slave_1) entered disabled state
[ 107.010345][ T9831] device bridge_slave_1 entered promiscuous mode
[ 107.038439][ T9831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 107.716470][ T9829] chnl_net:caif_netlink_parms(): no params data found
[ 107.741121][ T9831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 107.763681][ T9873] IPVS: ftp: loaded support on port[0] = 21
[ 108.349944][ T9874] IPVS: ftp: loaded support on port[0] = 21
[ 108.356846][ T9831] team0: Port device team_slave_0 added
[ 108.387067][ T9829] bridge0: port 1(bridge_slave_0) entered blocking state
[ 108.394374][ T9829] bridge0: port 1(bridge_slave_0) entered disabled state
[ 108.402677][ T9829] device bridge_slave_0 entered promiscuous mode
[ 108.413824][ T9829] bridge0: port 2(bridge_slave_1) entered blocking state
[ 108.421138][ T9829] bridge0: port 2(bridge_slave_1) entered disabled state
[ 108.429563][ T9829] device bridge_slave_1 entered promiscuous mode
[ 108.438088][ T9831] team0: Port device team_slave_1 added
[ 108.509032][ T28] device hsr_slave_0 left promiscuous mode
[ 108.547644][ T28] device hsr_slave_1 left promiscuous mode
[ 108.647876][ T28] device bridge_slave_1 left promiscuous mode
[ 108.654425][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 108.708508][ T28] device bridge_slave_0 left promiscuous mode
[ 108.714762][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 108.837528][ T28] device hsr_slave_0 left promiscuous mode
[ 108.887461][ T28] device hsr_slave_1 left promiscuous mode
[ 108.967763][ T28] device bridge_slave_1 left promiscuous mode
[ 108.974034][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 109.008550][ T28] device bridge_slave_0 left promiscuous mode
[ 109.014779][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 109.118171][ T28] device hsr_slave_0 left promiscuous mode
[ 109.177629][ T28] device hsr_slave_1 left promiscuous mode
[ 109.277846][ T28] device bridge_slave_1 left promiscuous mode
[ 109.284146][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 109.318508][ T28] device bridge_slave_0 left promiscuous mode
[ 109.324787][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 109.407569][ T28] device hsr_slave_0 left promiscuous mode
[ 109.447538][ T28] device hsr_slave_1 left promiscuous mode
[ 109.548070][ T28] device bridge_slave_1 left promiscuous mode
[ 109.554351][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 109.630497][ T28] device bridge_slave_0 left promiscuous mode
[ 109.636742][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 109.727657][ T28] device hsr_slave_0 left promiscuous mode
[ 109.787863][ T28] device hsr_slave_1 left promiscuous mode
[ 109.877768][ T28] device bridge_slave_1 left promiscuous mode
[ 109.883953][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 109.919475][ T28] device bridge_slave_0 left promiscuous mode
[ 109.925705][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 110.017656][ T28] device hsr_slave_0 left promiscuous mode
[ 110.087487][ T28] device hsr_slave_1 left promiscuous mode
[ 110.197736][ T28] device bridge_slave_1 left promiscuous mode
[ 110.203974][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 110.278596][ T28] device bridge_slave_0 left promiscuous mode
[ 110.284841][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 124.876012][ T28] team0 (unregistering): Port device team_slave_1 removed
[ 124.890215][ T28] team0 (unregistering): Port device team_slave_0 removed
[ 124.903618][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 124.944384][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 125.047102][ T28] bond0 (unregistering): Released all slaves
[ 125.186361][ T28] team0 (unregistering): Port device team_slave_1 removed
[ 125.200116][ T28] team0 (unregistering): Port device team_slave_0 removed
[ 125.213823][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 125.281919][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 125.366579][ T28] bond0 (unregistering): Released all slaves
[ 125.491245][ T28] team0 (unregistering): Port device team_slave_1 removed
[ 125.503068][ T28] team0 (unregistering): Port device team_slave_0 removed
[ 125.516962][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 125.575789][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 125.670375][ T28] bond0 (unregistering): Released all slaves
[ 125.786714][ T28] team0 (unregistering): Port device team_slave_1 removed
[ 125.800902][ T28] team0 (unregistering): Port device team_slave_0 removed
[ 125.814408][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 125.855432][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 125.969063][ T28] bond0 (unregistering): Released all slaves
[ 126.107923][ T28] team0 (unregistering): Port device team_slave_1 removed
[ 126.124782][ T28] team0 (unregistering): Port device team_slave_0 removed
[ 126.139893][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 126.195300][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 126.297341][ T28] bond0 (unregistering): Released all slaves
[ 126.427206][ T28] team0 (unregistering): Port device team_slave_1 removed
[ 126.444412][ T28] team0 (unregistering): Port device team_slave_0 removed
[ 126.458204][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 126.485350][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 126.580631][ T28] bond0 (unregistering): Released all slaves
[ 126.792189][ T9829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 126.806633][ T9829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 126.870702][ T9831] device hsr_slave_0 entered promiscuous mode
[ 126.907889][ T9831] device hsr_slave_1 entered promiscuous mode
[ 127.041120][ T9829] team0: Port device team_slave_0 added
[ 127.066828][ T9873] chnl_net:caif_netlink_parms(): no params data found
[ 127.080819][ T9829] team0: Port device team_slave_1 added
[ 127.200845][ T9829] device hsr_slave_0 entered promiscuous mode
[ 127.257946][ T9829] device hsr_slave_1 entered promiscuous mode
[ 127.297678][ T9829] debugfs: Directory 'hsr0' with parent '/' already present!
[ 127.322132][ T9874] chnl_net:caif_netlink_parms(): no params data found
[ 127.346310][ T9873] bridge0: port 1(bridge_slave_0) entered blocking state
[ 127.354016][ T9873] bridge0: port 1(bridge_slave_0) entered disabled state
[ 127.363476][ T9873] device bridge_slave_0 entered promiscuous mode
[ 127.396295][ T9873] bridge0: port 2(bridge_slave_1) entered blocking state
[ 127.403781][ T9873] bridge0: port 2(bridge_slave_1) entered disabled state
[ 127.416316][ T9873] device bridge_slave_1 entered promiscuous mode
[ 127.446405][ T9873] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 127.493741][ T9874] bridge0: port 1(bridge_slave_0) entered blocking state
[ 127.501237][ T9874] bridge0: port 1(bridge_slave_0) entered disabled state
[ 127.509670][ T9874] device bridge_slave_0 entered promiscuous mode
[ 127.533190][ T9873] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 127.548037][ T9874] bridge0: port 2(bridge_slave_1) entered blocking state
[ 127.555142][ T9874] bridge0: port 2(bridge_slave_1) entered disabled state
[ 127.563450][ T9874] device bridge_slave_1 entered promiscuous mode
[ 127.608904][ T9829] 8021q: adding VLAN 0 to HW filter on device bond0
[ 127.621888][ T9874] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 127.634675][ T9874] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 127.666794][ T9873] team0: Port device team_slave_0 added
[ 127.680751][ T9831] 8021q: adding VLAN 0 to HW filter on device bond0
[ 127.700024][ T9874] team0: Port device team_slave_0 added
[ 127.707176][ T9873] team0: Port device team_slave_1 added
[ 127.715209][ T9829] 8021q: adding VLAN 0 to HW filter on device team0
[ 127.724628][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 127.738483][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 127.747622][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 127.769492][ T9874] team0: Port device team_slave_1 added
[ 127.790008][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 127.800372][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 127.808769][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 127.818155][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 127.826734][ T9827] bridge0: port 1(bridge_slave_0) entered blocking state
[ 127.833868][ T9827] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 127.842346][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 127.851407][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 127.859827][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state
[ 127.866862][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 127.874890][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 127.884723][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 127.894330][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 127.927579][ T9831] 8021q: adding VLAN 0 to HW filter on device team0
[ 127.980890][ T9873] device hsr_slave_0 entered promiscuous mode
[ 128.028406][ T9873] device hsr_slave_1 entered promiscuous mode
[ 128.067493][ T9873] debugfs: Directory 'hsr0' with parent '/' already present!
[ 128.110897][ T9874] device hsr_slave_0 entered promiscuous mode
[ 128.158856][ T9874] device hsr_slave_1 entered promiscuous mode
[ 128.217615][ T9874] debugfs: Directory 'hsr0' with parent '/' already present!
[ 128.227684][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 128.236782][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 128.286419][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 128.298778][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 128.307611][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 128.316401][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state
[ 128.323556][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 128.332070][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 128.340918][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 128.349680][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state
[ 128.356749][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 128.364514][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 128.398300][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 128.406409][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 128.416620][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 128.425637][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 128.435408][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 128.444218][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 128.454615][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 128.462781][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 128.471291][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 128.537001][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 128.545648][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 128.554605][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 128.565370][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 128.574137][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 128.582561][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 128.594686][ T9831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 128.606540][ T9831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 128.730114][ T9829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 128.743975][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 128.756634][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 128.978881][ T9829] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 128.989252][ T9831] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 129.014193][ T9874] 8021q: adding VLAN 0 to HW filter on device bond0
[ 129.063886][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 129.088072][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 129.128312][ T9873] 8021q: adding VLAN 0 to HW filter on device bond0
[ 129.137902][ T9874] 8021q: adding VLAN 0 to HW filter on device team0
[ 129.213617][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 129.238662][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 129.256517][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state
[ 129.263762][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 129.285653][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 129.294672][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 129.303750][ T9825] bridge0: port 2(bridge_slave_1) entered blocking state
[ 129.310912][ T9825] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 129.336078][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 129.378909][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 129.394521][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 129.422464][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 129.440758][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 129.465879][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 129.488405][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 129.506775][ T9873] 8021q: adding VLAN 0 to HW filter on device team0
21:29:53 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:53 executing program 2:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:53 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:53 executing program 1:
syz_read_part_table(0x0, 0x0, 0x0)
syz_read_part_table(0x0, 0x0, &(0x7f0000000600))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000c80)={0x0, 0x3000})
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000cc0), 0x0)
[ 129.531166][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 129.552409][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 129.603350][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 129.627938][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 129.636482][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 129.646373][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 129.655351][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 129.672919][ T9874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 130.461089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 130.471075][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 130.479996][ T17] bridge0: port 1(bridge_slave_0) entered blocking state
[ 130.487060][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 130.496009][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
21:29:54 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:54 executing program 1:
r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0)
fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1)
[ 130.508830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 130.527387][ T17] bridge0: port 2(bridge_slave_1) entered blocking state
[ 130.534485][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 130.579343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 130.595281][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 130.624675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 130.651942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
21:29:55 executing program 4:
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x145002, 0x0)
[ 130.698443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 130.707005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
21:29:55 executing program 1:
creat(&(0x7f0000000200)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='ecryptfs\x00', 0x0, &(0x7f0000000180)='nfs\x00')
[ 130.764917][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 130.806017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 130.826216][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 130.856714][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 130.899615][ T9873] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 130.912174][ T9873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 130.929106][ T9874] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 130.946131][ T9904] IPVS: ftp: loaded support on port[0] = 21
[ 130.957161][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 130.979663][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 131.009585][ T9905] IPVS: ftp: loaded support on port[0] = 21
[ 131.124265][ T9873] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 131.260079][ T9905] chnl_net:caif_netlink_parms(): no params data found
21:29:55 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 131.432911][ T9905] bridge0: port 1(bridge_slave_0) entered blocking state
[ 131.497520][ T9905] bridge0: port 1(bridge_slave_0) entered disabled state
[ 131.505680][ T9905] device bridge_slave_0 entered promiscuous mode
[ 131.535608][ T9904] chnl_net:caif_netlink_parms(): no params data found
21:29:56 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 132.070116][ T9905] bridge0: port 2(bridge_slave_1) entered blocking state
[ 132.077222][ T9905] bridge0: port 2(bridge_slave_1) entered disabled state
[ 132.086082][ T9905] device bridge_slave_1 entered promiscuous mode
[ 132.123689][ T9929] IPVS: ftp: loaded support on port[0] = 21
[ 132.148309][ T9928] IPVS: ftp: loaded support on port[0] = 21
21:29:56 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
[ 132.470604][ T9904] bridge0: port 1(bridge_slave_0) entered blocking state
[ 132.477948][ T9904] bridge0: port 1(bridge_slave_0) entered disabled state
[ 132.486215][ T9904] device bridge_slave_0 entered promiscuous mode
21:29:56 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200))
setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4)
sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00')
lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000540))
stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0))
getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0)
setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0)
write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
socket$inet(0x2, 0x0, 0x0)
21:29:56 executing program 3:
socketpair(0x21, 0x0, 0x2, &(0x7f0000000040))
[ 132.559808][ T9905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 132.601057][ T9904] bridge0: port 2(bridge_slave_1) entered blocking state
[ 132.624322][ T9904] bridge0: port 2(bridge_slave_1) entered disabled state
[ 132.638389][ T9904] device bridge_slave_1 entered promiscuous mode
[ 132.702123][ T9905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 132.723410][ T9904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 132.735425][ T9904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 132.810042][ T9904] team0: Port device team_slave_0 added
[ 132.849323][ T9905] team0: Port device team_slave_0 added
[ 132.856440][ T9904] team0: Port device team_slave_1 added
[ 132.901224][ T9905] team0: Port device team_slave_1 added
[ 133.091904][ T9904] device hsr_slave_0 entered promiscuous mode
[ 133.158124][ T9904] device hsr_slave_1 entered promiscuous mode
[ 133.218512][ T9904] debugfs: Directory 'hsr0' with parent '/' already present!
[ 133.266324][ T9929] chnl_net:caif_netlink_parms(): no params data found
[ 133.361411][ T9905] device hsr_slave_0 entered promiscuous mode
[ 133.417910][ T9905] device hsr_slave_1 entered promiscuous mode
[ 133.457633][ T9905] debugfs: Directory 'hsr0' with parent '/' already present!
[ 133.523208][ T9928] chnl_net:caif_netlink_parms(): no params data found
[ 133.556283][ T9929] bridge0: port 1(bridge_slave_0) entered blocking state
[ 133.563589][ T9929] bridge0: port 1(bridge_slave_0) entered disabled state
[ 133.571948][ T9929] device bridge_slave_0 entered promiscuous mode
[ 133.581344][ T9929] bridge0: port 2(bridge_slave_1) entered blocking state
[ 133.588491][ T9929] bridge0: port 2(bridge_slave_1) entered disabled state
[ 133.596597][ T9929] device bridge_slave_1 entered promiscuous mode
[ 133.643773][ T9929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 133.675053][ T9929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 133.697605][ T9928] bridge0: port 1(bridge_slave_0) entered blocking state
[ 133.704719][ T9928] bridge0: port 1(bridge_slave_0) entered disabled state
[ 133.724983][ T9928] device bridge_slave_0 entered promiscuous mode
[ 133.795542][ T9928] bridge0: port 2(bridge_slave_1) entered blocking state
[ 133.804633][ T9928] bridge0: port 2(bridge_slave_1) entered disabled state
[ 133.813912][ T9928] device bridge_slave_1 entered promiscuous mode
[ 133.839738][ T9928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 133.859893][ T9929] team0: Port device team_slave_0 added
[ 133.868889][ T9928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 133.906537][ T9929] team0: Port device team_slave_1 added
[ 133.936730][ T9928] team0: Port device team_slave_0 added
[ 133.946405][ T9933] IPVS: ftp: loaded support on port[0] = 21
[ 133.966374][ T9904] 8021q: adding VLAN 0 to HW filter on device bond0
[ 133.984875][ T9928] team0: Port device team_slave_1 added
[ 134.013886][ T9904] 8021q: adding VLAN 0 to HW filter on device team0
[ 134.050535][ T9929] device hsr_slave_0 entered promiscuous mode
[ 134.087941][ T9929] device hsr_slave_1 entered promiscuous mode
[ 134.107973][ T9929] debugfs: Directory 'hsr0' with parent '/' already present!
[ 134.118801][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 134.126558][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 134.179234][ T9905] 8021q: adding VLAN 0 to HW filter on device bond0
[ 134.194951][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 134.203710][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 134.212491][ T9877] bridge0: port 1(bridge_slave_0) entered blocking state
[ 134.219626][ T9877] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 134.227159][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 134.236281][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 134.244816][ T9877] bridge0: port 2(bridge_slave_1) entered blocking state
[ 134.251937][ T9877] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 134.260977][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 134.332636][ T9928] device hsr_slave_0 entered promiscuous mode
[ 134.369373][ T9928] device hsr_slave_1 entered promiscuous mode
[ 134.397439][ T9928] debugfs: Directory 'hsr0' with parent '/' already present!
[ 134.409462][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 134.439035][ T9905] 8021q: adding VLAN 0 to HW filter on device team0
[ 134.453947][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 134.464313][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 134.473137][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 134.483275][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 134.491754][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 134.500459][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 134.533080][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 134.542918][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 134.551943][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 134.561478][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 134.570566][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 134.579865][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 134.588678][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state
[ 134.595749][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 134.603787][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 134.612846][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 134.621858][ T9825] bridge0: port 2(bridge_slave_1) entered blocking state
[ 134.628986][ T9825] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 134.636530][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 134.646768][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 134.663615][ T9904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 134.679132][ T9904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 136.145749][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 136.156905][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 136.915520][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 137.701712][ T9929] 8021q: adding VLAN 0 to HW filter on device bond0
[ 137.741629][ T9904] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 137.775628][ T9905] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 137.794784][ T9905] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 137.806672][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 137.816631][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 137.825936][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 137.834214][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 137.842758][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 137.851808][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 137.860990][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 137.870050][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 137.878936][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 137.887655][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 137.895909][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 137.904354][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 137.933712][ T9929] 8021q: adding VLAN 0 to HW filter on device team0
[ 138.682767][ T9933] chnl_net:caif_netlink_parms(): no params data found
[ 138.731816][ T9905] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 138.808778][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 138.817631][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 138.826040][ T9826] bridge0: port 1(bridge_slave_0) entered blocking state
[ 138.833182][ T9826] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 138.842593][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 138.851891][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 138.861269][ T9826] bridge0: port 2(bridge_slave_1) entered blocking state
[ 138.868415][ T9826] bridge0: port 2(bridge_slave_1) entered forwarding state
21:30:03 executing program 5:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x2ef5f48bbc02d3e3, 0x0, 0x0)
[ 139.740428][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 139.750300][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 139.766550][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 140.833783][ T9933] bridge0: port 1(bridge_slave_0) entered blocking state
[ 140.841732][ T9933] bridge0: port 1(bridge_slave_0) entered disabled state
[ 140.853448][ T9933] device bridge_slave_0 entered promiscuous mode
[ 140.864565][ T9933] bridge0: port 2(bridge_slave_1) entered blocking state
[ 140.875244][ T9933] bridge0: port 2(bridge_slave_1) entered disabled state
[ 140.901411][ T9933] device bridge_slave_1 entered promiscuous mode
[ 140.946854][ T9928] 8021q: adding VLAN 0 to HW filter on device bond0
[ 140.983896][ T9956] IPVS: ftp: loaded support on port[0] = 21
[ 140.996379][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 141.024378][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 141.054864][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 141.078147][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 141.086756][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
21:30:05 executing program 2:
mkdir(0x0, 0x0)
syz_open_dev$loop(0x0, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
21:30:05 executing program 0:
fanotify_init(0x34, 0x0)
[ 141.104428][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 141.132290][ T9929] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 141.145108][ T9929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 141.165904][ T9928] 8021q: adding VLAN 0 to HW filter on device team0
[ 141.183532][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 141.199134][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 141.207616][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 141.215832][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 141.223997][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 142.189307][ T9933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 142.247238][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 142.256119][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 142.264720][ T9827] bridge0: port 1(bridge_slave_0) entered blocking state
[ 142.271826][ T9827] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 142.280809][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 142.289738][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
21:30:06 executing program 0:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1, 0x0)
lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
[ 142.298721][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state
[ 142.305792][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 142.350891][ T9933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 142.383299][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 142.398254][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 142.407013][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
21:30:06 executing program 0:
setrlimit(0x10000000002, &(0x7f0000000000)={0x1, 0x8})
pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0xffffffffffffffff)
[ 142.444719][ T9929] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 142.494674][ T9964] IPVS: ftp: loaded support on port[0] = 21
[ 143.291803][ T9933] team0: Port device team_slave_0 added
[ 143.300513][ T9933] team0: Port device team_slave_1 added
[ 143.309359][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 143.318357][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 143.330162][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 143.376039][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 143.396959][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 143.405902][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 143.414819][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 144.241112][ T9928] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 144.253357][ T9928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 144.278528][ T9970] IPVS: ftp: loaded support on port[0] = 21
[ 144.320653][ T9933] device hsr_slave_0 entered promiscuous mode
[ 144.332441][ T9973] ecryptfs_parse_options: eCryptfs: unrecognized option [nfs]
[ 144.340068][ T9973] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README
[ 144.354050][ T9933] device hsr_slave_1 entered promiscuous mode
[ 144.361937][ T9973] Error parsing options; rc = [-22]
[ 144.408423][ T9933] debugfs: Directory 'hsr0' with parent '/' already present!
[ 144.444584][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 144.457452][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 144.518279][ T28] device hsr_slave_0 left promiscuous mode
[ 144.557539][ T28] device hsr_slave_1 left promiscuous mode
[ 144.637996][ T28] device bridge_slave_1 left promiscuous mode
[ 144.644280][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 144.698309][ T28] device bridge_slave_0 left promiscuous mode
[ 144.704452][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 144.837598][ T28] device hsr_slave_0 left promiscuous mode
[ 144.877531][ T28] device hsr_slave_1 left promiscuous mode
[ 144.977764][ T28] device bridge_slave_1 left promiscuous mode
[ 144.984033][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 145.048248][ T28] device bridge_slave_0 left promiscuous mode
[ 145.054422][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 145.167471][ T28] device hsr_slave_0 left promiscuous mode
[ 145.238033][ T28] device hsr_slave_1 left promiscuous mode
[ 145.317717][ T28] device bridge_slave_1 left promiscuous mode
[ 145.323972][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 145.368513][ T28] device bridge_slave_0 left promiscuous mode
[ 145.374688][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 145.477650][ T28] device hsr_slave_0 left promiscuous mode
[ 145.537491][ T28] device hsr_slave_1 left promiscuous mode
[ 145.637718][ T28] device bridge_slave_1 left promiscuous mode
[ 145.643985][ T28] bridge0: port 2(bridge_slave_1) entered disabled state
[ 145.698538][ T28] device bridge_slave_0 left promiscuous mode
[ 145.704760][ T28] bridge0: port 1(bridge_slave_0) entered disabled state
[ 145.797446][ C1] kasan: CONFIG_KASAN_INLINE enabled
[ 145.802967][ C1] kasan: GPF could be caused by NULL-ptr deref or user memory access
[ 145.811089][ C1] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[ 145.818033][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.2.0+ #61
[ 145.824929][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 145.834996][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20
[ 145.841417][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 31 bc 4b fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b
[ 145.861010][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202
[ 145.867090][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8726a287
[ 145.875055][ C1] RDX: 0000000000000002 RSI: ffffffff87268f3f RDI: 0000000000000000
[ 145.883004][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98ce340 R09: ffffed1015d26c84
[ 145.890956][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff8880975d7540
[ 145.898913][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000
[ 145.906874][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
[ 145.915874][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 145.922441][ C1] CR2: 00000000018f0fd0 CR3: 00000000a0a46000 CR4: 00000000001406e0
[ 145.930762][ C1] Call Trace:
[ 145.934035][ C1]
[ 145.936891][ C1] ? lock_acquire+0x190/0x410
[ 145.941548][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 145.947784][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 145.953497][ C1] hsr_announce+0x12f/0x3b0
[ 145.957992][ C1] call_timer_fn+0x1ac/0x780
[ 145.962572][ C1] ? hsr_dev_open+0x380/0x380
[ 145.967227][ C1] ? msleep_interruptible+0x150/0x150
[ 145.972675][ C1] ? run_timer_softirq+0x685/0x17a0
[ 145.977862][ C1] ? trace_hardirqs_on+0x67/0x240
[ 145.982872][ C1] ? __kasan_check_read+0x11/0x20
[ 145.987898][ C1] ? hsr_dev_open+0x380/0x380
[ 145.992587][ C1] ? hsr_dev_open+0x380/0x380
[ 145.997268][ C1] run_timer_softirq+0x697/0x17a0
[ 146.002290][ C1] ? add_timer+0x930/0x930
[ 146.006691][ C1] ? kvm_clock_read+0x18/0x30
[ 146.011347][ C1] ? kvm_sched_clock_read+0x9/0x20
[ 146.016434][ C1] ? sched_clock+0x2e/0x50
[ 146.020841][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 146.027072][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 146.033294][ C1] __do_softirq+0x262/0x98c
[ 146.037785][ C1] ? sched_clock_cpu+0x1b/0x1b0
[ 146.042628][ C1] irq_exit+0x19b/0x1e0
[ 146.046763][ C1] smp_apic_timer_interrupt+0x1a3/0x610
[ 146.052301][ C1] apic_timer_interrupt+0xf/0x20
[ 146.057209][ C1]
[ 146.060143][ C1] RIP: 0010:native_safe_halt+0xe/0x10
[ 146.065504][ C1] Code: a8 4d 7b fa eb 8a 90 90 90 90 90 90 e9 07 00 00 00 0f 00 2d 94 30 57 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d 84 30 57 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 3e 49 2f fa e8 19
[ 146.085090][ C1] RSP: 0018:ffff8880a98e7d68 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[ 146.093483][ C1] RAX: 1ffffffff11a5ca5 RBX: ffff8880a98ce340 RCX: 0000000000000000
[ 146.101437][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a98cebcc
[ 146.109389][ C1] RBP: ffff8880a98e7d98 R08: ffff8880a98ce340 R09: 0000000000000000
[ 146.117352][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000
[ 146.125314][ C1] R13: ffffffff89a29278 R14: 0000000000000000 R15: 0000000000000001
[ 146.133285][ C1] ? default_idle+0x4e/0x360
[ 146.137890][ C1] arch_cpu_idle+0xa/0x10
[ 146.142212][ C1] default_idle_call+0x84/0xb0
[ 146.146972][ C1] do_idle+0x413/0x760
[ 146.151021][ C1] ? arch_cpu_idle_exit+0x80/0x80
[ 146.156112][ C1] ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[ 146.161898][ C1] ? complete+0x61/0x80
[ 146.166029][ C1] cpu_startup_entry+0x1b/0x20
[ 146.170772][ C1] start_secondary+0x315/0x430
[ 146.175528][ C1] ? set_cpu_sibling_map+0x2180/0x2180
[ 146.180985][ C1] secondary_startup_64+0xa4/0xb0
[ 146.185993][ C1] Modules linked in:
[ 146.189930][ C1] ---[ end trace 317af72e173247a1 ]---
[ 146.195393][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20
[ 146.201822][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 31 bc 4b fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b
[ 146.221445][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202
[ 146.227538][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8726a287
[ 146.235514][ C1] RDX: 0000000000000002 RSI: ffffffff87268f3f RDI: 0000000000000000
[ 146.243479][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98ce340 R09: ffffed1015d26c84
[ 146.251449][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff8880975d7540
[ 146.259425][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000
[ 146.267431][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
[ 146.276356][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 146.282932][ C1] CR2: 00000000018f0fd0 CR3: 00000000a0a46000 CR4: 00000000001406e0
[ 146.290902][ C1] Kernel panic - not syncing: Fatal exception in interrupt
[ 146.299044][ C1] Kernel Offset: disabled
[ 146.303365][ C1] Rebooting in 86400 seconds..