[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.362363][ T26] audit: type=1800 audit(1563053324.656:25): pid=9008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.389554][ T26] audit: type=1800 audit(1563053324.656:26): pid=9008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.436444][ T26] audit: type=1800 audit(1563053324.656:27): pid=9008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.58' (ECDSA) to the list of known hosts. 2019/07/13 21:28:52 fuzzer started 2019/07/13 21:28:55 dialing manager at 10.128.0.26:37019 2019/07/13 21:28:55 checking machine... 2019/07/13 21:28:55 checking revisions... 2019/07/13 21:28:55 testing simple program... syzkaller login: [ 71.470644][ T9177] IPVS: ftp: loaded support on port[0] = 21 2019/07/13 21:28:55 building call list... [ 72.768254][ T9164] can: request_module (can-proto-0) failed. [ 73.278174][ T9164] can: request_module (can-proto-0) failed. 2019/07/13 21:29:01 syscalls: 2465 2019/07/13 21:29:01 code coverage: enabled 2019/07/13 21:29:01 comparison tracing: enabled 2019/07/13 21:29:01 extra coverage: extra coverage is not supported by the kernel 2019/07/13 21:29:01 setuid sandbox: enabled 2019/07/13 21:29:01 namespace sandbox: enabled 2019/07/13 21:29:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/13 21:29:01 fault injection: enabled 2019/07/13 21:29:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/13 21:29:01 net packet injection: enabled 2019/07/13 21:29:01 net device setup: enabled 21:29:02 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 78.630088][ T9220] IPVS: ftp: loaded support on port[0] = 21 21:29:03 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 78.775349][ T9220] chnl_net:caif_netlink_parms(): no params data found [ 78.880882][ T9220] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.888742][ T9220] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.896990][ T9220] device bridge_slave_0 entered promiscuous mode [ 78.918764][ T9220] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.925935][ T9220] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.935000][ T9220] device bridge_slave_1 entered promiscuous mode [ 78.951448][ T9223] IPVS: ftp: loaded support on port[0] = 21 [ 79.005431][ T9220] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.023218][ T9220] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:29:03 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) [ 79.071494][ T9220] team0: Port device team_slave_0 added [ 79.096012][ T9220] team0: Port device team_slave_1 added [ 79.250836][ T9220] device hsr_slave_0 entered promiscuous mode 21:29:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 79.347841][ T9220] device hsr_slave_1 entered promiscuous mode [ 79.414825][ T9223] chnl_net:caif_netlink_parms(): no params data found [ 79.430944][ T9226] IPVS: ftp: loaded support on port[0] = 21 [ 79.453899][ T9220] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.461360][ T9220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.469542][ T9220] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.476679][ T9220] bridge0: port 1(bridge_slave_0) entered forwarding state 21:29:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) [ 79.670887][ T9223] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.687472][ T9223] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.689805][ T9229] IPVS: ftp: loaded support on port[0] = 21 [ 79.718387][ T9223] device bridge_slave_0 entered promiscuous mode [ 79.730825][ T9223] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.747546][ T9223] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.767451][ T9223] device bridge_slave_1 entered promiscuous mode [ 79.800733][ T9231] IPVS: ftp: loaded support on port[0] = 21 [ 79.821990][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.830993][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.864324][ T9220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.915455][ T9223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.962932][ T9223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.992540][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.008499][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:29:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238) [ 80.055300][ T9220] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.157517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.166879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.176115][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.183239][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.190954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 80.199917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.208498][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.215612][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.254706][ T9229] chnl_net:caif_netlink_parms(): no params data found [ 80.266560][ T9223] team0: Port device team_slave_0 added [ 80.275115][ T9223] team0: Port device team_slave_1 added [ 80.292265][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 80.306601][ T9226] chnl_net:caif_netlink_parms(): no params data found [ 80.340979][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 80.372028][ T9235] IPVS: ftp: loaded support on port[0] = 21 [ 80.420940][ T9223] device hsr_slave_0 entered promiscuous mode [ 80.467804][ T9223] device hsr_slave_1 entered promiscuous mode [ 80.507517][ T9223] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.585254][ T9229] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.595410][ T9229] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.603465][ T9229] device bridge_slave_0 entered promiscuous mode [ 80.636854][ T9231] chnl_net:caif_netlink_parms(): no params data found [ 80.646871][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 80.657569][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.666274][ T9229] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.674091][ T9229] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.682054][ T9229] device bridge_slave_1 entered promiscuous mode [ 80.704721][ T9226] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.711882][ T9226] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.721612][ T9226] device bridge_slave_0 entered promiscuous mode [ 80.729818][ T9226] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.736893][ T9226] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.745210][ T9226] device bridge_slave_1 entered promiscuous mode [ 80.759856][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.769617][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 80.778602][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.805094][ T9229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.830477][ T9226] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.868622][ T9229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.882804][ T9226] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.914161][ T9231] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.922705][ T9231] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.930741][ T9231] device bridge_slave_0 entered promiscuous mode [ 80.970278][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 80.979777][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.989137][ T9231] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.996310][ T9231] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.004863][ T9231] device bridge_slave_1 entered promiscuous mode [ 81.019789][ T9226] team0: Port device team_slave_0 added [ 81.030725][ T9229] team0: Port device team_slave_0 added [ 81.038507][ T9229] team0: Port device team_slave_1 added [ 81.057853][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 81.066635][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 81.099593][ T9226] team0: Port device team_slave_1 added [ 81.107890][ T9220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 81.128293][ T9231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.210435][ T9226] device hsr_slave_0 entered promiscuous mode [ 81.247894][ T9226] device hsr_slave_1 entered promiscuous mode [ 81.297535][ T9226] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.307943][ T9231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.381311][ T9229] device hsr_slave_0 entered promiscuous mode [ 81.438000][ T9229] device hsr_slave_1 entered promiscuous mode [ 81.477515][ T9229] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.490829][ T9220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.519232][ T9235] chnl_net:caif_netlink_parms(): no params data found [ 81.585556][ T9231] team0: Port device team_slave_0 added [ 81.608359][ T9223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.626322][ T9235] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.636487][ T9235] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.645728][ T9235] device bridge_slave_0 entered promiscuous mode [ 81.655998][ T9231] team0: Port device team_slave_1 added [ 81.681083][ T9235] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.688382][ T9235] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.696173][ T9235] device bridge_slave_1 entered promiscuous mode [ 81.770852][ T9231] device hsr_slave_0 entered promiscuous mode [ 81.807888][ T9231] device hsr_slave_1 entered promiscuous mode [ 81.847496][ T9231] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.876363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.884801][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.898022][ T9223] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.932300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.941709][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.950430][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.957575][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.966575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.003622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.014440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.023535][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.030704][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.039941][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 21:29:06 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 82.073334][ T9235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:29:06 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 82.161019][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.176635][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.186416][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.206724][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.217727][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.226367][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.235678][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 21:29:06 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 82.254763][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.263860][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.284517][ T9235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.325762][ T9226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.341426][ T9223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:29:06 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() [ 82.380571][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.419420][ T9229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.444391][ T9223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.501102][ C0] hrtimer: interrupt took 37053 ns [ 82.512540][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.529354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.545100][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.553630][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.574746][ T9226] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.601805][ T9235] team0: Port device team_slave_0 added [ 82.619410][ T9229] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.658978][ T9235] team0: Port device team_slave_1 added [ 82.673998][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.693944][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.703429][ T9237] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.710900][ T9237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.732506][ T9231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.766498][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.775281][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.789531][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.803347][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.810513][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.826040][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.835905][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.852083][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.860839][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.867962][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.875801][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.884954][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.907923][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.915086][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.923368][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.932411][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.965533][ T9231] 8021q: adding VLAN 0 to HW filter on device team0 21:29:07 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() [ 83.037875][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.045966][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.094344][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.125389][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 21:29:07 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 83.146692][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.164004][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.173762][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.188406][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.202504][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.211470][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.229403][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:29:07 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() [ 83.262934][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.272342][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.280820][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:29:07 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 83.372070][ T9235] device hsr_slave_0 entered promiscuous mode [ 83.429467][ T9235] device hsr_slave_1 entered promiscuous mode [ 83.477755][ T9235] debugfs: Directory 'hsr0' with parent '/' already present! [ 83.508929][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.527069][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.536405][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.545530][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.554986][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.564053][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.572706][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.581500][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.590387][ T9228] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.597535][ T9228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.605198][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.614666][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.623227][ T9228] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.630351][ T9228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.638836][ T9228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.650022][ T9229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.669785][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.677999][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.694736][ T9226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.706954][ T9226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.728398][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.736932][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.764440][ T9231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.775591][ T9231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.798775][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.808350][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.816713][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.826989][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.836314][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.844896][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.853885][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.862651][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.871521][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.879752][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.920815][ T9229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.933612][ T9231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.962164][ T9226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.005335][ T9235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.036485][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.053077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.070792][ T9235] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.104040][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.119340][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.155267][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.162434][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.217714][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.225951][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.244796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.255040][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.262314][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.272883][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.312490][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.329666][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.360524][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.370053][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 84.379774][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.389234][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.406035][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.414745][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.423879][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.434592][ T9235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.449842][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:29:08 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) [ 84.505337][ T9235] 8021q: adding VLAN 0 to HW filter on device batadv0 21:29:08 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:08 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 21:29:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238) 21:29:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 21:29:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) 21:29:09 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) 21:29:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) 21:29:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) 21:29:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 21:29:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238) 21:29:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 21:29:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x3a, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) 21:29:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x3d, 0x0, 0x20001}, [@ldst={0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238) 21:29:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:09 executing program 1: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:09 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:10 executing program 5: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = fsopen(&(0x7f0000000400)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x6) 21:29:10 executing program 1: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 2: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 5: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 1: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 2: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:10 executing program 5: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 1: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 5: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 2: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 1: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 2: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:11 executing program 5: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 1: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 2: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 5: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 0: fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe) 21:29:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 21:29:12 executing program 2: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:12 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:29:12 executing program 0: fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe) [ 88.611750][ T9618] overlayfs: overlapping lowerdir path 21:29:13 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() [ 88.711453][ T9618] overlayfs: overlapping lowerdir path 21:29:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 21:29:13 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:29:13 executing program 0: fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe) 21:29:13 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:29:13 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() 21:29:13 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sync() [ 89.051283][ T9649] overlayfs: overlapping lowerdir path 21:29:13 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:29:13 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:29:13 executing program 0: fspick(0xffffffffffffff9c, 0x0, 0xfffffffffffffffe) 21:29:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 21:29:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) [ 89.390555][ T9678] overlayfs: overlapping lowerdir path 21:29:13 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 21:29:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 21:29:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]}) 21:29:13 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 89.560449][ T9685] overlayfs: overlapping lowerdir path 21:29:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:29:14 executing program 5: fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]}) [ 89.743894][ T9697] overlayfs: overlapping lowerdir path 21:29:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 21:29:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]}) 21:29:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 89.939641][ T9702] ldm_validate_privheads(): Disk read failed. [ 89.972610][ T9702] loop4: p1 21:29:14 executing program 5: fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 89.988382][ T9702] loop4: partition table partially beyond EOD, truncated [ 90.019247][ T9711] overlayfs: overlapping lowerdir path [ 90.053812][ T9702] loop4: p1 start 1 is beyond EOD, truncated 21:29:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:29:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 21:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000040)=[{0x4d}]}) 21:29:14 executing program 5: fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:29:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:29:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:14 executing program 5: fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 90.420595][ T9739] overlayfs: overlapping lowerdir path 21:29:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:29:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 90.479140][ T9745] ldm_validate_privheads(): Disk read failed. [ 90.518392][ T9745] loop4: p1 [ 90.558643][ T9745] loop4: partition table partially beyond EOD, truncated 21:29:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 90.618286][ T9745] loop4: p1 start 1 is beyond EOD, truncated 21:29:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:29:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:29:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 90.998302][ T9771] ldm_validate_privheads(): Disk read failed. [ 91.012315][ T9771] loop4: p1 [ 91.024785][ T9771] loop4: partition table partially beyond EOD, truncated [ 91.079694][ T9771] loop4: p1 start 1 is beyond EOD, truncated 21:29:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="02006300000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:29:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 92.350992][ T9789] ldm_validate_privheads(): Disk read failed. [ 92.378819][ T9789] loop4: p1 [ 92.382166][ T9789] loop4: partition table partially beyond EOD, truncated [ 92.400270][ T9789] loop4: p1 start 1 is beyond EOD, truncated 21:29:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 93.519255][ T9802] IPVS: ftp: loaded support on port[0] = 21 [ 93.745116][ T9802] chnl_net:caif_netlink_parms(): no params data found [ 93.775813][ T9802] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.783105][ T9802] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.791287][ T9802] device bridge_slave_0 entered promiscuous mode [ 93.876012][ T9802] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.890594][ T9802] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.908549][ T9802] device bridge_slave_1 entered promiscuous mode [ 94.191574][ T9802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.201614][ T9809] IPVS: ftp: loaded support on port[0] = 21 [ 94.216679][ T9808] IPVS: ftp: loaded support on port[0] = 21 [ 94.221763][ T9811] IPVS: ftp: loaded support on port[0] = 21 [ 94.232083][ T9810] IPVS: ftp: loaded support on port[0] = 21 [ 94.247911][ T9278] device hsr_slave_0 left promiscuous mode [ 94.307544][ T9278] device hsr_slave_1 left promiscuous mode [ 94.389347][ T9278] device bridge_slave_1 left promiscuous mode [ 94.396114][ T9278] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.451020][ T9278] device bridge_slave_0 left promiscuous mode [ 94.457219][ T9278] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.488107][ T9278] team0 (unregistering): Port device team_slave_1 removed [ 96.502407][ T9278] team0 (unregistering): Port device team_slave_0 removed [ 96.514358][ T9278] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 96.554246][ T9278] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 96.640225][ T9278] bond0 (unregistering): Released all slaves [ 96.754468][ T9802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.784899][ T9802] team0: Port device team_slave_0 added [ 96.796979][ T9802] team0: Port device team_slave_1 added [ 96.910795][ T9802] device hsr_slave_0 entered promiscuous mode [ 96.957933][ T9802] device hsr_slave_1 entered promiscuous mode [ 96.997435][ T9802] debugfs: Directory 'hsr0' with parent '/' already present! [ 97.169091][ T9809] chnl_net:caif_netlink_parms(): no params data found [ 97.463998][ T9808] chnl_net:caif_netlink_parms(): no params data found [ 97.572194][ T9802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.616211][ T9809] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.633882][ T9809] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.646164][ T9809] device bridge_slave_0 entered promiscuous mode [ 97.686792][ T9811] chnl_net:caif_netlink_parms(): no params data found [ 97.712369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.728903][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.745811][ T9810] chnl_net:caif_netlink_parms(): no params data found [ 97.781397][ T9809] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.796681][ T9809] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.805668][ T9809] device bridge_slave_1 entered promiscuous mode [ 97.826114][ T9802] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.919385][ T9808] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.926498][ T9808] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.949172][ T9808] device bridge_slave_0 entered promiscuous mode [ 97.975093][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.985241][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.005402][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.012605][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.034045][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.054915][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.071251][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.078424][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.123988][ T9809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.142215][ T9808] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.151333][ T9808] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.159925][ T9808] device bridge_slave_1 entered promiscuous mode [ 98.176719][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.185501][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 98.196440][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 98.208564][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 98.218100][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 98.240480][ T9809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.263334][ T9811] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.287817][ T9811] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.295989][ T9811] device bridge_slave_0 entered promiscuous mode [ 98.319092][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 98.327103][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 98.348821][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 98.358010][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.366606][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.375095][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.383741][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.393581][ T9802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 98.431404][ T9811] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.438739][ T9811] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.446789][ T9811] device bridge_slave_1 entered promiscuous mode [ 98.469378][ T9802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.481679][ T9808] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.494624][ T9809] team0: Port device team_slave_0 added [ 98.501877][ T9810] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.527205][ T9810] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.544390][ T9810] device bridge_slave_0 entered promiscuous mode [ 98.564177][ T9808] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.574903][ T9809] team0: Port device team_slave_1 added [ 98.581731][ T9810] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.592940][ T9810] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.601152][ T9810] device bridge_slave_1 entered promiscuous mode [ 98.661829][ T9811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.675123][ T9811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.703916][ T9810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.714661][ T9808] team0: Port device team_slave_0 added [ 98.771085][ T9809] device hsr_slave_0 entered promiscuous mode [ 98.817912][ T9809] device hsr_slave_1 entered promiscuous mode [ 98.857585][ T9809] debugfs: Directory 'hsr0' with parent '/' already present! [ 98.888385][ T9810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.909019][ T9808] team0: Port device team_slave_1 added [ 98.916903][ T9811] team0: Port device team_slave_0 added [ 98.960995][ T9811] team0: Port device team_slave_1 added 21:29:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 99.040525][ T9808] device hsr_slave_0 entered promiscuous mode [ 99.078858][ T9808] device hsr_slave_1 entered promiscuous mode [ 99.117414][ T9808] debugfs: Directory 'hsr0' with parent '/' already present! [ 99.135837][ T9810] team0: Port device team_slave_0 added [ 99.149393][ T9810] team0: Port device team_slave_1 added [ 99.410655][ T9811] device hsr_slave_0 entered promiscuous mode 21:29:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 99.488004][ T9811] device hsr_slave_1 entered promiscuous mode [ 99.527397][ T9811] debugfs: Directory 'hsr0' with parent '/' already present! 21:29:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 99.661148][ T9810] device hsr_slave_0 entered promiscuous mode [ 99.737877][ T9810] device hsr_slave_1 entered promiscuous mode [ 99.807366][ T9810] debugfs: Directory 'hsr0' with parent '/' already present! [ 99.903603][ T9809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.923006][ T9808] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.988356][ T9809] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.006250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.014645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.034164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.046657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.055869][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.063019][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.071411][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.079404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.093153][ T9808] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.103923][ T9811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.114810][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.127775][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.136795][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.146133][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.153309][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.166950][ T9810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.229091][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.238630][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.254190][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.261291][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.269190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.278121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.286443][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.293547][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.301595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.310616][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.319855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.329032][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.336688][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.344808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.366796][ T9810] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.377253][ T9811] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.394934][ T9829] IPVS: ftp: loaded support on port[0] = 21 [ 101.453294][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.461639][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.470692][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.479583][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.487262][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.496288][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.506499][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.515131][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.524115][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.532896][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.541847][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.550871][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.559442][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.590114][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.605458][ T9831] IPVS: ftp: loaded support on port[0] = 21 [ 101.612288][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.620508][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.629437][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.638427][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.646782][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.655632][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.664945][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.673864][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.681008][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.689225][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.698084][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.706450][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.713580][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.724112][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.732643][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.740894][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.749256][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.268338][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.277066][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.286853][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.293995][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.302673][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.311810][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.320633][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.329163][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.336210][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.360641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.369683][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.378890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.388702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.398409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.406870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.415535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.428043][ T9809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.437675][ T9808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.447907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.456069][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.474369][ T9811] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 102.546269][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.554831][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.567043][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 103.079197][ T9809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.108640][ T9808] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.167857][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.177919][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.195012][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.203975][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.212619][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.221144][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.229705][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.238321][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.247395][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 103.769463][ T9810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.800215][ T9811] 8021q: adding VLAN 0 to HW filter on device batadv0 21:29:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 104.833858][ T9810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.091065][ T9831] chnl_net:caif_netlink_parms(): no params data found 21:29:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 106.970375][ T9831] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.977716][ T9831] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.985378][ T9831] device bridge_slave_0 entered promiscuous mode [ 106.994595][ T9831] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.001793][ T9831] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.010345][ T9831] device bridge_slave_1 entered promiscuous mode [ 107.038439][ T9831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.716470][ T9829] chnl_net:caif_netlink_parms(): no params data found [ 107.741121][ T9831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.763681][ T9873] IPVS: ftp: loaded support on port[0] = 21 [ 108.349944][ T9874] IPVS: ftp: loaded support on port[0] = 21 [ 108.356846][ T9831] team0: Port device team_slave_0 added [ 108.387067][ T9829] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.394374][ T9829] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.402677][ T9829] device bridge_slave_0 entered promiscuous mode [ 108.413824][ T9829] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.421138][ T9829] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.429563][ T9829] device bridge_slave_1 entered promiscuous mode [ 108.438088][ T9831] team0: Port device team_slave_1 added [ 108.509032][ T28] device hsr_slave_0 left promiscuous mode [ 108.547644][ T28] device hsr_slave_1 left promiscuous mode [ 108.647876][ T28] device bridge_slave_1 left promiscuous mode [ 108.654425][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.708508][ T28] device bridge_slave_0 left promiscuous mode [ 108.714762][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.837528][ T28] device hsr_slave_0 left promiscuous mode [ 108.887461][ T28] device hsr_slave_1 left promiscuous mode [ 108.967763][ T28] device bridge_slave_1 left promiscuous mode [ 108.974034][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.008550][ T28] device bridge_slave_0 left promiscuous mode [ 109.014779][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.118171][ T28] device hsr_slave_0 left promiscuous mode [ 109.177629][ T28] device hsr_slave_1 left promiscuous mode [ 109.277846][ T28] device bridge_slave_1 left promiscuous mode [ 109.284146][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.318508][ T28] device bridge_slave_0 left promiscuous mode [ 109.324787][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.407569][ T28] device hsr_slave_0 left promiscuous mode [ 109.447538][ T28] device hsr_slave_1 left promiscuous mode [ 109.548070][ T28] device bridge_slave_1 left promiscuous mode [ 109.554351][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.630497][ T28] device bridge_slave_0 left promiscuous mode [ 109.636742][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.727657][ T28] device hsr_slave_0 left promiscuous mode [ 109.787863][ T28] device hsr_slave_1 left promiscuous mode [ 109.877768][ T28] device bridge_slave_1 left promiscuous mode [ 109.883953][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.919475][ T28] device bridge_slave_0 left promiscuous mode [ 109.925705][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.017656][ T28] device hsr_slave_0 left promiscuous mode [ 110.087487][ T28] device hsr_slave_1 left promiscuous mode [ 110.197736][ T28] device bridge_slave_1 left promiscuous mode [ 110.203974][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.278596][ T28] device bridge_slave_0 left promiscuous mode [ 110.284841][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.876012][ T28] team0 (unregistering): Port device team_slave_1 removed [ 124.890215][ T28] team0 (unregistering): Port device team_slave_0 removed [ 124.903618][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 124.944384][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 125.047102][ T28] bond0 (unregistering): Released all slaves [ 125.186361][ T28] team0 (unregistering): Port device team_slave_1 removed [ 125.200116][ T28] team0 (unregistering): Port device team_slave_0 removed [ 125.213823][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 125.281919][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 125.366579][ T28] bond0 (unregistering): Released all slaves [ 125.491245][ T28] team0 (unregistering): Port device team_slave_1 removed [ 125.503068][ T28] team0 (unregistering): Port device team_slave_0 removed [ 125.516962][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 125.575789][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 125.670375][ T28] bond0 (unregistering): Released all slaves [ 125.786714][ T28] team0 (unregistering): Port device team_slave_1 removed [ 125.800902][ T28] team0 (unregistering): Port device team_slave_0 removed [ 125.814408][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 125.855432][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 125.969063][ T28] bond0 (unregistering): Released all slaves [ 126.107923][ T28] team0 (unregistering): Port device team_slave_1 removed [ 126.124782][ T28] team0 (unregistering): Port device team_slave_0 removed [ 126.139893][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 126.195300][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 126.297341][ T28] bond0 (unregistering): Released all slaves [ 126.427206][ T28] team0 (unregistering): Port device team_slave_1 removed [ 126.444412][ T28] team0 (unregistering): Port device team_slave_0 removed [ 126.458204][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 126.485350][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 126.580631][ T28] bond0 (unregistering): Released all slaves [ 126.792189][ T9829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.806633][ T9829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.870702][ T9831] device hsr_slave_0 entered promiscuous mode [ 126.907889][ T9831] device hsr_slave_1 entered promiscuous mode [ 127.041120][ T9829] team0: Port device team_slave_0 added [ 127.066828][ T9873] chnl_net:caif_netlink_parms(): no params data found [ 127.080819][ T9829] team0: Port device team_slave_1 added [ 127.200845][ T9829] device hsr_slave_0 entered promiscuous mode [ 127.257946][ T9829] device hsr_slave_1 entered promiscuous mode [ 127.297678][ T9829] debugfs: Directory 'hsr0' with parent '/' already present! [ 127.322132][ T9874] chnl_net:caif_netlink_parms(): no params data found [ 127.346310][ T9873] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.354016][ T9873] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.363476][ T9873] device bridge_slave_0 entered promiscuous mode [ 127.396295][ T9873] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.403781][ T9873] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.416316][ T9873] device bridge_slave_1 entered promiscuous mode [ 127.446405][ T9873] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.493741][ T9874] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.501237][ T9874] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.509670][ T9874] device bridge_slave_0 entered promiscuous mode [ 127.533190][ T9873] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.548037][ T9874] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.555142][ T9874] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.563450][ T9874] device bridge_slave_1 entered promiscuous mode [ 127.608904][ T9829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.621888][ T9874] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.634675][ T9874] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.666794][ T9873] team0: Port device team_slave_0 added [ 127.680751][ T9831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.700024][ T9874] team0: Port device team_slave_0 added [ 127.707176][ T9873] team0: Port device team_slave_1 added [ 127.715209][ T9829] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.724628][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 127.738483][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.747622][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.769492][ T9874] team0: Port device team_slave_1 added [ 127.790008][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.800372][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.808769][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.818155][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.826734][ T9827] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.833868][ T9827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.842346][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.851407][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.859827][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.866862][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.874890][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.884723][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.894330][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.927579][ T9831] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.980890][ T9873] device hsr_slave_0 entered promiscuous mode [ 128.028406][ T9873] device hsr_slave_1 entered promiscuous mode [ 128.067493][ T9873] debugfs: Directory 'hsr0' with parent '/' already present! [ 128.110897][ T9874] device hsr_slave_0 entered promiscuous mode [ 128.158856][ T9874] device hsr_slave_1 entered promiscuous mode [ 128.217615][ T9874] debugfs: Directory 'hsr0' with parent '/' already present! [ 128.227684][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.236782][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.286419][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.298778][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.307611][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.316401][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.323556][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.332070][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.340918][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.349680][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.356749][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.364514][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.398300][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.406409][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.416620][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.425637][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.435408][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.444218][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.454615][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.462781][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.471291][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.537001][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.545648][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.554605][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.565370][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.574137][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.582561][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.594686][ T9831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 128.606540][ T9831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.730114][ T9829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.743975][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.756634][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.978881][ T9829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.989252][ T9831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.014193][ T9874] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.063886][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.088072][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.128312][ T9873] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.137902][ T9874] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.213617][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.238662][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.256517][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.263762][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.285653][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.294672][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.303750][ T9825] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.310912][ T9825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.336078][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.378909][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.394521][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.422464][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.440758][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.465879][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.488405][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.506775][ T9873] 8021q: adding VLAN 0 to HW filter on device team0 21:29:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:53 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000c80)={0x0, 0x3000}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000cc0), 0x0) [ 129.531166][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.552409][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.603350][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.627938][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.636482][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.646373][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.655351][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.672919][ T9874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.461089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.471075][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.479996][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.487060][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.496009][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:29:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:54 executing program 1: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) [ 130.508830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.527387][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.534485][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.579343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.595281][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.624675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.651942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 21:29:55 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x145002, 0x0) [ 130.698443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.707005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:29:55 executing program 1: creat(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='ecryptfs\x00', 0x0, &(0x7f0000000180)='nfs\x00') [ 130.764917][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.806017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.826216][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.856714][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.899615][ T9873] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.912174][ T9873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.929106][ T9874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.946131][ T9904] IPVS: ftp: loaded support on port[0] = 21 [ 130.957161][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.979663][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.009585][ T9905] IPVS: ftp: loaded support on port[0] = 21 [ 131.124265][ T9873] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.260079][ T9905] chnl_net:caif_netlink_parms(): no params data found 21:29:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 131.432911][ T9905] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.497520][ T9905] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.505680][ T9905] device bridge_slave_0 entered promiscuous mode [ 131.535608][ T9904] chnl_net:caif_netlink_parms(): no params data found 21:29:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 132.070116][ T9905] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.077222][ T9905] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.086082][ T9905] device bridge_slave_1 entered promiscuous mode [ 132.123689][ T9929] IPVS: ftp: loaded support on port[0] = 21 [ 132.148309][ T9928] IPVS: ftp: loaded support on port[0] = 21 21:29:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 132.470604][ T9904] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.477948][ T9904] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.486215][ T9904] device bridge_slave_0 entered promiscuous mode 21:29:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000200)) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000880)=0xdd08, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8020}, 0xc, &(0x7f0000000240)={0x0}}, 0x91) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresuid(0x0, 0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresuid(&(0x7f0000000640), &(0x7f0000000680), 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x7dd, [{{0x22, 0x2, 0x7}, 0xffffffffffffffc0, 0x1000, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x5, 0x5, 0x7, './file0'}, {{0x11, 0x0, 0x6}, 0x6, 0x80000001, 0x7, './file0'}]}}, 0x68) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) socket$inet(0x2, 0x0, 0x0) 21:29:56 executing program 3: socketpair(0x21, 0x0, 0x2, &(0x7f0000000040)) [ 132.559808][ T9905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.601057][ T9904] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.624322][ T9904] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.638389][ T9904] device bridge_slave_1 entered promiscuous mode [ 132.702123][ T9905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.723410][ T9904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.735425][ T9904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.810042][ T9904] team0: Port device team_slave_0 added [ 132.849323][ T9905] team0: Port device team_slave_0 added [ 132.856440][ T9904] team0: Port device team_slave_1 added [ 132.901224][ T9905] team0: Port device team_slave_1 added [ 133.091904][ T9904] device hsr_slave_0 entered promiscuous mode [ 133.158124][ T9904] device hsr_slave_1 entered promiscuous mode [ 133.218512][ T9904] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.266324][ T9929] chnl_net:caif_netlink_parms(): no params data found [ 133.361411][ T9905] device hsr_slave_0 entered promiscuous mode [ 133.417910][ T9905] device hsr_slave_1 entered promiscuous mode [ 133.457633][ T9905] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.523208][ T9928] chnl_net:caif_netlink_parms(): no params data found [ 133.556283][ T9929] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.563589][ T9929] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.571948][ T9929] device bridge_slave_0 entered promiscuous mode [ 133.581344][ T9929] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.588491][ T9929] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.596597][ T9929] device bridge_slave_1 entered promiscuous mode [ 133.643773][ T9929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.675053][ T9929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.697605][ T9928] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.704719][ T9928] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.724983][ T9928] device bridge_slave_0 entered promiscuous mode [ 133.795542][ T9928] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.804633][ T9928] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.813912][ T9928] device bridge_slave_1 entered promiscuous mode [ 133.839738][ T9928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.859893][ T9929] team0: Port device team_slave_0 added [ 133.868889][ T9928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.906537][ T9929] team0: Port device team_slave_1 added [ 133.936730][ T9928] team0: Port device team_slave_0 added [ 133.946405][ T9933] IPVS: ftp: loaded support on port[0] = 21 [ 133.966374][ T9904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.984875][ T9928] team0: Port device team_slave_1 added [ 134.013886][ T9904] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.050535][ T9929] device hsr_slave_0 entered promiscuous mode [ 134.087941][ T9929] device hsr_slave_1 entered promiscuous mode [ 134.107973][ T9929] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.118801][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.126558][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.179234][ T9905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.194951][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.203710][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.212491][ T9877] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.219626][ T9877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.227159][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.236281][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.244816][ T9877] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.251937][ T9877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.260977][ T9877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.332636][ T9928] device hsr_slave_0 entered promiscuous mode [ 134.369373][ T9928] device hsr_slave_1 entered promiscuous mode [ 134.397439][ T9928] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.409462][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.439035][ T9905] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.453947][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.464313][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.473137][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.483275][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.491754][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.500459][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.533080][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.542918][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.551943][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.561478][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.570566][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.579865][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.588678][ T9825] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.595749][ T9825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.603787][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.612846][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.621858][ T9825] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.628986][ T9825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.636530][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.646768][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.663615][ T9904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 134.679132][ T9904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.145749][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.156905][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.915520][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.701712][ T9929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.741629][ T9904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.775628][ T9905] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 137.794784][ T9905] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 137.806672][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.816631][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.825936][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.834214][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.842758][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.851808][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.860990][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.870050][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.878936][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.887655][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.895909][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.904354][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.933712][ T9929] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.682767][ T9933] chnl_net:caif_netlink_parms(): no params data found [ 138.731816][ T9905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.808778][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.817631][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.826040][ T9826] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.833182][ T9826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.842593][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.851891][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.861269][ T9826] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.868415][ T9826] bridge0: port 2(bridge_slave_1) entered forwarding state 21:30:03 executing program 5: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x2ef5f48bbc02d3e3, 0x0, 0x0) [ 139.740428][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.750300][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.766550][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.833783][ T9933] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.841732][ T9933] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.853448][ T9933] device bridge_slave_0 entered promiscuous mode [ 140.864565][ T9933] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.875244][ T9933] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.901411][ T9933] device bridge_slave_1 entered promiscuous mode [ 140.946854][ T9928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.983896][ T9956] IPVS: ftp: loaded support on port[0] = 21 [ 140.996379][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 141.024378][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 141.054864][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 141.078147][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 141.086756][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:30:05 executing program 2: mkdir(0x0, 0x0) syz_open_dev$loop(0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) 21:30:05 executing program 0: fanotify_init(0x34, 0x0) [ 141.104428][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.132290][ T9929] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 141.145108][ T9929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.165904][ T9928] 8021q: adding VLAN 0 to HW filter on device team0 [ 141.183532][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.199134][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.207616][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.215832][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.223997][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.189307][ T9933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 142.247238][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.256119][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.264720][ T9827] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.271826][ T9827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.280809][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.289738][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 21:30:06 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) [ 142.298721][ T9827] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.305792][ T9827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.350891][ T9933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.383299][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.398254][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.407013][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:30:06 executing program 0: setrlimit(0x10000000002, &(0x7f0000000000)={0x1, 0x8}) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0xffffffffffffffff) [ 142.444719][ T9929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 142.494674][ T9964] IPVS: ftp: loaded support on port[0] = 21 [ 143.291803][ T9933] team0: Port device team_slave_0 added [ 143.300513][ T9933] team0: Port device team_slave_1 added [ 143.309359][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.318357][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.330162][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.376039][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.396959][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.405902][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.414819][ T9827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.241112][ T9928] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 144.253357][ T9928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.278528][ T9970] IPVS: ftp: loaded support on port[0] = 21 [ 144.320653][ T9933] device hsr_slave_0 entered promiscuous mode [ 144.332441][ T9973] ecryptfs_parse_options: eCryptfs: unrecognized option [nfs] [ 144.340068][ T9973] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 144.354050][ T9933] device hsr_slave_1 entered promiscuous mode [ 144.361937][ T9973] Error parsing options; rc = [-22] [ 144.408423][ T9933] debugfs: Directory 'hsr0' with parent '/' already present! [ 144.444584][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.457452][ T9881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.518279][ T28] device hsr_slave_0 left promiscuous mode [ 144.557539][ T28] device hsr_slave_1 left promiscuous mode [ 144.637996][ T28] device bridge_slave_1 left promiscuous mode [ 144.644280][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.698309][ T28] device bridge_slave_0 left promiscuous mode [ 144.704452][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.837598][ T28] device hsr_slave_0 left promiscuous mode [ 144.877531][ T28] device hsr_slave_1 left promiscuous mode [ 144.977764][ T28] device bridge_slave_1 left promiscuous mode [ 144.984033][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.048248][ T28] device bridge_slave_0 left promiscuous mode [ 145.054422][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.167471][ T28] device hsr_slave_0 left promiscuous mode [ 145.238033][ T28] device hsr_slave_1 left promiscuous mode [ 145.317717][ T28] device bridge_slave_1 left promiscuous mode [ 145.323972][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.368513][ T28] device bridge_slave_0 left promiscuous mode [ 145.374688][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.477650][ T28] device hsr_slave_0 left promiscuous mode [ 145.537491][ T28] device hsr_slave_1 left promiscuous mode [ 145.637718][ T28] device bridge_slave_1 left promiscuous mode [ 145.643985][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.698538][ T28] device bridge_slave_0 left promiscuous mode [ 145.704760][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.797446][ C1] kasan: CONFIG_KASAN_INLINE enabled [ 145.802967][ C1] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 145.811089][ C1] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 145.818033][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.2.0+ #61 [ 145.824929][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.834996][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 145.841417][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 31 bc 4b fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 145.861010][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202 [ 145.867090][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8726a287 [ 145.875055][ C1] RDX: 0000000000000002 RSI: ffffffff87268f3f RDI: 0000000000000000 [ 145.883004][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98ce340 R09: ffffed1015d26c84 [ 145.890956][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff8880975d7540 [ 145.898913][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 145.906874][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 145.915874][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 145.922441][ C1] CR2: 00000000018f0fd0 CR3: 00000000a0a46000 CR4: 00000000001406e0 [ 145.930762][ C1] Call Trace: [ 145.934035][ C1] [ 145.936891][ C1] ? lock_acquire+0x190/0x410 [ 145.941548][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 145.947784][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 145.953497][ C1] hsr_announce+0x12f/0x3b0 [ 145.957992][ C1] call_timer_fn+0x1ac/0x780 [ 145.962572][ C1] ? hsr_dev_open+0x380/0x380 [ 145.967227][ C1] ? msleep_interruptible+0x150/0x150 [ 145.972675][ C1] ? run_timer_softirq+0x685/0x17a0 [ 145.977862][ C1] ? trace_hardirqs_on+0x67/0x240 [ 145.982872][ C1] ? __kasan_check_read+0x11/0x20 [ 145.987898][ C1] ? hsr_dev_open+0x380/0x380 [ 145.992587][ C1] ? hsr_dev_open+0x380/0x380 [ 145.997268][ C1] run_timer_softirq+0x697/0x17a0 [ 146.002290][ C1] ? add_timer+0x930/0x930 [ 146.006691][ C1] ? kvm_clock_read+0x18/0x30 [ 146.011347][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 146.016434][ C1] ? sched_clock+0x2e/0x50 [ 146.020841][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 146.027072][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 146.033294][ C1] __do_softirq+0x262/0x98c [ 146.037785][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 146.042628][ C1] irq_exit+0x19b/0x1e0 [ 146.046763][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 146.052301][ C1] apic_timer_interrupt+0xf/0x20 [ 146.057209][ C1] [ 146.060143][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 146.065504][ C1] Code: a8 4d 7b fa eb 8a 90 90 90 90 90 90 e9 07 00 00 00 0f 00 2d 94 30 57 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d 84 30 57 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 3e 49 2f fa e8 19 [ 146.085090][ C1] RSP: 0018:ffff8880a98e7d68 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 146.093483][ C1] RAX: 1ffffffff11a5ca5 RBX: ffff8880a98ce340 RCX: 0000000000000000 [ 146.101437][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a98cebcc [ 146.109389][ C1] RBP: ffff8880a98e7d98 R08: ffff8880a98ce340 R09: 0000000000000000 [ 146.117352][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 146.125314][ C1] R13: ffffffff89a29278 R14: 0000000000000000 R15: 0000000000000001 [ 146.133285][ C1] ? default_idle+0x4e/0x360 [ 146.137890][ C1] arch_cpu_idle+0xa/0x10 [ 146.142212][ C1] default_idle_call+0x84/0xb0 [ 146.146972][ C1] do_idle+0x413/0x760 [ 146.151021][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 146.156112][ C1] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 146.161898][ C1] ? complete+0x61/0x80 [ 146.166029][ C1] cpu_startup_entry+0x1b/0x20 [ 146.170772][ C1] start_secondary+0x315/0x430 [ 146.175528][ C1] ? set_cpu_sibling_map+0x2180/0x2180 [ 146.180985][ C1] secondary_startup_64+0xa4/0xb0 [ 146.185993][ C1] Modules linked in: [ 146.189930][ C1] ---[ end trace 317af72e173247a1 ]--- [ 146.195393][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 146.201822][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 31 bc 4b fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 146.221445][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202 [ 146.227538][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8726a287 [ 146.235514][ C1] RDX: 0000000000000002 RSI: ffffffff87268f3f RDI: 0000000000000000 [ 146.243479][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98ce340 R09: ffffed1015d26c84 [ 146.251449][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff8880975d7540 [ 146.259425][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 146.267431][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 146.276356][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 146.282932][ C1] CR2: 00000000018f0fd0 CR3: 00000000a0a46000 CR4: 00000000001406e0 [ 146.290902][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 146.299044][ C1] Kernel Offset: disabled [ 146.303365][ C1] Rebooting in 86400 seconds..