[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.223359][ T26] audit: type=1800 audit(1562856082.277:25): pid=8292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 51.268066][ T26] audit: type=1800 audit(1562856082.277:26): pid=8292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 51.309301][ T26] audit: type=1800 audit(1562856082.287:27): pid=8292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2019/07/11 14:41:30 fuzzer started 2019/07/11 14:41:32 dialing manager at 10.128.0.26:44701 2019/07/11 14:41:34 syscalls: 2465 2019/07/11 14:41:34 code coverage: enabled 2019/07/11 14:41:34 comparison tracing: enabled 2019/07/11 14:41:34 extra coverage: extra coverage is not supported by the kernel 2019/07/11 14:41:34 setuid sandbox: enabled 2019/07/11 14:41:34 namespace sandbox: enabled 2019/07/11 14:41:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/11 14:41:34 fault injection: enabled 2019/07/11 14:41:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/11 14:41:34 net packet injection: enabled 2019/07/11 14:41:34 net device setup: enabled 14:41:35 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) syzkaller login: [ 64.307474][ T8458] IPVS: ftp: loaded support on port[0] = 21 14:41:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506000001ed000071184400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 64.422721][ T8458] chnl_net:caif_netlink_parms(): no params data found [ 64.521520][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.529094][ T8458] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.538008][ T8458] device bridge_slave_0 entered promiscuous mode [ 64.555597][ T8461] IPVS: ftp: loaded support on port[0] = 21 [ 64.563232][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.570560][ T8458] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.584048][ T8458] device bridge_slave_1 entered promiscuous mode 14:41:35 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 64.633732][ T8458] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.661600][ T8458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.711848][ T8458] team0: Port device team_slave_0 added [ 64.757338][ T8458] team0: Port device team_slave_1 added 14:41:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x35, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) [ 64.923157][ T8458] device hsr_slave_0 entered promiscuous mode [ 64.980537][ T8458] device hsr_slave_1 entered promiscuous mode [ 65.037547][ T8464] IPVS: ftp: loaded support on port[0] = 21 [ 65.054420][ T8466] IPVS: ftp: loaded support on port[0] = 21 [ 65.061889][ T8461] chnl_net:caif_netlink_parms(): no params data found [ 65.072527][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.079788][ T8458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.093335][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.100469][ T8458] bridge0: port 1(bridge_slave_0) entered forwarding state 14:41:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 65.241931][ T8461] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.249102][ T8461] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.270250][ T8461] device bridge_slave_0 entered promiscuous mode [ 65.297547][ T8458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.313626][ T8461] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.329658][ T8461] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.337680][ T8461] device bridge_slave_1 entered promiscuous mode [ 65.376308][ T8469] IPVS: ftp: loaded support on port[0] = 21 [ 65.391595][ T8461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.418799][ T8461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 65.430337][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.442321][ T8467] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.461380][ T8467] bridge0: port 2(bridge_slave_1) entered disabled state 14:41:36 executing program 5: syz_mount_image$iso9660(&(0x7f0000000b80)='iso9660\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={[{@map_off='map=off'}, {@gid={'gid'}}]}) [ 65.470865][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 65.491846][ T8458] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.594022][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.605028][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.613937][ T3449] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.621031][ T3449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.651218][ T8461] team0: Port device team_slave_0 added [ 65.656981][ T8466] chnl_net:caif_netlink_parms(): no params data found [ 65.684822][ T8464] chnl_net:caif_netlink_parms(): no params data found [ 65.694460][ T8475] IPVS: ftp: loaded support on port[0] = 21 [ 65.704404][ T8461] team0: Port device team_slave_1 added [ 65.721765][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.731395][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.740296][ T8467] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.747446][ T8467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.802160][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.828923][ T8466] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.837369][ T8466] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.846301][ T8466] device bridge_slave_0 entered promiscuous mode [ 65.855903][ T8466] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.863190][ T8466] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.871162][ T8466] device bridge_slave_1 entered promiscuous mode [ 65.878747][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.887112][ T8464] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.895999][ T8464] device bridge_slave_0 entered promiscuous mode [ 65.904074][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.911210][ T8464] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.918946][ T8464] device bridge_slave_1 entered promiscuous mode [ 65.972294][ T8461] device hsr_slave_0 entered promiscuous mode [ 66.009717][ T8461] device hsr_slave_1 entered promiscuous mode [ 66.049881][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.101925][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.111248][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.128880][ T8464] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.145724][ T8458] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.157119][ T8458] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.174257][ T8466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.193336][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.202414][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.210979][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.219166][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.227592][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.237416][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.245891][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.254554][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.265191][ T8464] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.291111][ T8466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.312692][ T8466] team0: Port device team_slave_0 added [ 66.320343][ T8466] team0: Port device team_slave_1 added [ 66.332717][ T8464] team0: Port device team_slave_0 added [ 66.361103][ T8464] team0: Port device team_slave_1 added [ 66.423211][ T8466] device hsr_slave_0 entered promiscuous mode [ 66.489565][ T8466] device hsr_slave_1 entered promiscuous mode [ 66.545494][ T8469] chnl_net:caif_netlink_parms(): no params data found [ 66.557073][ T8458] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.661565][ T8464] device hsr_slave_0 entered promiscuous mode [ 66.700285][ T8464] device hsr_slave_1 entered promiscuous mode [ 66.811614][ T8469] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.818751][ T8469] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.827279][ T8469] device bridge_slave_0 entered promiscuous mode 14:41:37 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) 14:41:37 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) [ 66.906974][ T8461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.915070][ T8469] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.927320][ T8469] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.937015][ T8469] device bridge_slave_1 entered promiscuous mode 14:41:38 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) [ 66.972510][ T8475] chnl_net:caif_netlink_parms(): no params data found 14:41:38 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 67.045785][ T8469] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 67.056255][ T8461] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.064407][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.073882][ T3449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:41:38 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 67.091720][ T8493] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed [ 67.098247][ T8493] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' [ 67.108826][ T8466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.131541][ T8469] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.150042][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.161325][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.170477][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.174015][ T8497] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed [ 67.177546][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.189284][ T8497] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' 14:41:38 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 67.218732][ T8466] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.241529][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.261021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.274981][ T8501] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed [ 67.280173][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.288165][ T8501] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' [ 67.300839][ T8475] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.307961][ T8475] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.317459][ T8475] device bridge_slave_0 entered promiscuous mode 14:41:38 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 67.336204][ T8475] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.343667][ T8475] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.361393][ T8475] device bridge_slave_1 entered promiscuous mode [ 67.375061][ T8469] team0: Port device team_slave_0 added [ 67.389915][ T8464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.397345][ T8503] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed [ 67.409537][ T8503] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' [ 67.416240][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.425653][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.435516][ T8467] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.442630][ T8467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.450955][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.460006][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.468799][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.487149][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.495759][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.504907][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.513486][ T8467] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.520604][ T8467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.528235][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.536873][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.545177][ T8467] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.552246][ T8467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.559953][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.567564][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.576598][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.584811][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.601200][ T8469] team0: Port device team_slave_1 added [ 67.617739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.627424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.636139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.645036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.653431][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.662483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.671554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.685137][ T8461] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 67.695957][ T8461] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.719391][ T8475] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 67.736504][ T8466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 67.747782][ T8466] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.760081][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.768417][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.777554][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.786127][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.794476][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.803430][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.811980][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.820705][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.828887][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.837324][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.845711][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.853760][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.862542][ T8464] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.871714][ T8475] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.932591][ T8469] device hsr_slave_0 entered promiscuous mode [ 68.019680][ T8469] device hsr_slave_1 entered promiscuous mode [ 68.080722][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.089359][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.097663][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.104760][ T3460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.112676][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.121548][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.129975][ T3460] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.137018][ T3460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.144681][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.153677][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.174529][ T8466] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.201367][ T8475] team0: Port device team_slave_0 added [ 68.228333][ T8461] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.238775][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.254992][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.263999][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.273480][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.282094][ T8475] team0: Port device team_slave_1 added [ 68.352838][ T8475] device hsr_slave_0 entered promiscuous mode [ 68.404994][ T8475] device hsr_slave_1 entered promiscuous mode [ 68.447623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.456813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.466022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.474916][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.483616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.492015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.521658][ T8464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:41:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506000001ed000071184400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 68.597544][ T8469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.623932][ T8464] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.638900][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.669863][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.688567][ T8475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.709663][ T8469] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.731439][ T8475] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.747611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.767874][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.803096][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.817133][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.825591][ T8467] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.832692][ T8467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.840713][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.849775][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.858080][ T8467] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.865168][ T8467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.873425][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.882365][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.891111][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.899863][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.908140][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.916702][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.925216][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.933627][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.942466][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.950437][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.962861][ T8469] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.974914][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.990424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.999161][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.008511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.017773][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.026722][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.033979][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.042247][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.051142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.059678][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.066757][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.074787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.083605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.110395][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.127801][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.148262][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.170569][ T8531] overlayfs: failed to resolve 'fiXe0': -2 [ 69.171771][ T8469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.188045][ T8475] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 69.188386][ T8532] overlayfs: failed to resolve 'fiXe0': -2 [ 69.206993][ T8475] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:41:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) 14:41:40 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 69.223034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.232488][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.253513][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.264788][ T8536] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed [ 69.271332][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.271842][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.272460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.289824][ T8536] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' [ 69.322761][ T8538] overlayfs: failed to resolve 'fiXe0': -2 [ 69.333725][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.374157][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.415493][ T8475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.609243][ C1] hrtimer: interrupt took 54687 ns [ 69.675600][ T8553] ISOFS: Unable to identify CD-ROM format. [ 69.680905][ T8550] FAT-fs (loop4): Directory bread(block 64) failed [ 69.688647][ T8550] FAT-fs (loop4): Directory bread(block 65) failed [ 69.695840][ T8550] FAT-fs (loop4): Directory bread(block 66) failed [ 69.705013][ T8550] FAT-fs (loop4): Directory bread(block 67) failed [ 69.712786][ T8550] FAT-fs (loop4): Directory bread(block 68) failed [ 69.719561][ T8550] FAT-fs (loop4): Directory bread(block 69) failed [ 69.726251][ T8550] FAT-fs (loop4): Directory bread(block 70) failed [ 69.733045][ T8550] FAT-fs (loop4): Directory bread(block 71) failed [ 69.745333][ T8550] FAT-fs (loop4): Directory bread(block 72) failed [ 69.756268][ T8550] FAT-fs (loop4): Directory bread(block 73) failed 14:41:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506000001ed000071184400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 69.818635][ T8553] ISOFS: Unable to identify CD-ROM format. 14:41:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000b80)='iso9660\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={[{@map_off='map=off'}, {@gid={'gid'}}]}) 14:41:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x35, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 14:41:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) 14:41:41 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 14:41:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506000001ed000071184400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 70.025747][ T8576] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed [ 70.054216][ T8573] overlayfs: failed to resolve 'fiXe0': -2 14:41:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x35, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) [ 70.084580][ T8576] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' 14:41:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 70.175170][ T8579] ISOFS: Unable to identify CD-ROM format. 14:41:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x35, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 14:41:41 executing program 0: mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b642efe6db60e98b7d183c63a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 70.387017][ T8575] FAT-fs (loop4): Directory bread(block 64) failed [ 70.399661][ T8575] FAT-fs (loop4): Directory bread(block 65) failed [ 70.446779][ T8575] FAT-fs (loop4): Directory bread(block 66) failed [ 70.457843][ T8603] libceph: resolve 'd.þm¶˜·ÑƒÆ' (ret=-3): failed 14:41:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000b80)='iso9660\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={[{@map_off='map=off'}, {@gid={'gid'}}]}) [ 70.487335][ T8593] overlayfs: failed to resolve 'fiXe0': -2 [ 70.492779][ T8603] libceph: parse_ips bad ip '[d.þm¶˜·ÑƒÆ' [ 70.509494][ T8588] FAT-fs (loop1): Directory bread(block 64) failed [ 70.524791][ T8575] FAT-fs (loop4): Directory bread(block 67) failed 14:41:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 70.527027][ T8588] FAT-fs (loop1): Directory bread(block 65) failed [ 70.576820][ T8575] FAT-fs (loop4): Directory bread(block 68) failed [ 70.592482][ T8588] FAT-fs (loop1): Directory bread(block 66) failed [ 70.612258][ T8575] FAT-fs (loop4): Directory bread(block 69) failed 14:41:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 70.669575][ T8588] FAT-fs (loop1): Directory bread(block 67) failed [ 70.681411][ T8588] FAT-fs (loop1): Directory bread(block 68) failed [ 70.685504][ T8575] FAT-fs (loop4): Directory bread(block 70) failed [ 70.711024][ T8608] ISOFS: Unable to identify CD-ROM format. [ 70.739975][ T8575] FAT-fs (loop4): Directory bread(block 71) failed 14:41:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 70.764160][ T8588] FAT-fs (loop1): Directory bread(block 69) failed [ 70.780718][ T8575] FAT-fs (loop4): Directory bread(block 72) failed [ 70.802487][ T8588] FAT-fs (loop1): Directory bread(block 70) failed [ 70.842366][ T8588] FAT-fs (loop1): Directory bread(block 71) failed [ 70.866908][ T8611] FAT-fs (loop3): Directory bread(block 64) failed [ 70.869508][ T8575] FAT-fs (loop4): Directory bread(block 73) failed [ 70.892427][ T8588] FAT-fs (loop1): Directory bread(block 72) failed [ 70.900915][ T8611] FAT-fs (loop3): Directory bread(block 65) failed [ 70.944834][ T8588] FAT-fs (loop1): Directory bread(block 73) failed [ 70.956893][ T8611] FAT-fs (loop3): Directory bread(block 66) failed 14:41:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000b80)='iso9660\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={[{@map_off='map=off'}, {@gid={'gid'}}]}) [ 70.992399][ T8611] FAT-fs (loop3): Directory bread(block 67) failed [ 71.025124][ T8611] FAT-fs (loop3): Directory bread(block 68) failed [ 71.072476][ T8611] FAT-fs (loop3): Directory bread(block 69) failed [ 71.126517][ T8611] FAT-fs (loop3): Directory bread(block 70) failed [ 71.134701][ T8617] FAT-fs (loop0): Directory bread(block 64) failed [ 71.147751][ T8617] FAT-fs (loop0): Directory bread(block 65) failed [ 71.173472][ T8620] FAT-fs (loop2): Directory bread(block 64) failed [ 71.175539][ T8617] FAT-fs (loop0): Directory bread(block 66) failed [ 71.190393][ T8617] FAT-fs (loop0): Directory bread(block 67) failed [ 71.193716][ T8611] FAT-fs (loop3): Directory bread(block 71) failed [ 71.197248][ T8617] FAT-fs (loop0): Directory bread(block 68) failed [ 71.210573][ T8629] ISOFS: Unable to identify CD-ROM format. [ 71.211756][ T8620] FAT-fs (loop2): Directory bread(block 65) failed 14:41:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 71.228685][ T8611] FAT-fs (loop3): Directory bread(block 72) failed [ 71.230228][ T8620] FAT-fs (loop2): Directory bread(block 66) failed [ 71.242757][ T8611] FAT-fs (loop3): Directory bread(block 73) failed [ 71.253624][ T8617] FAT-fs (loop0): Directory bread(block 69) failed [ 71.254318][ T8620] FAT-fs (loop2): Directory bread(block 67) failed [ 71.262061][ T8617] FAT-fs (loop0): Directory bread(block 70) failed [ 71.273779][ T8620] FAT-fs (loop2): Directory bread(block 68) failed [ 71.276182][ T8617] FAT-fs (loop0): Directory bread(block 71) failed [ 71.289020][ T8620] FAT-fs (loop2): Directory bread(block 69) failed [ 71.295573][ T8617] FAT-fs (loop0): Directory bread(block 72) failed [ 71.295739][ T8617] FAT-fs (loop0): Directory bread(block 73) failed [ 71.309634][ T8620] FAT-fs (loop2): Directory bread(block 70) failed [ 71.316699][ T8620] FAT-fs (loop2): Directory bread(block 71) failed [ 71.324465][ T8620] FAT-fs (loop2): Directory bread(block 72) failed [ 71.331757][ T8620] FAT-fs (loop2): Directory bread(block 73) failed 14:41:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:42 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 71.682005][ T8642] FAT-fs (loop1): Directory bread(block 64) failed [ 71.693582][ T8642] FAT-fs (loop1): Directory bread(block 65) failed [ 71.701285][ T8642] FAT-fs (loop1): Directory bread(block 66) failed [ 71.708295][ T8642] FAT-fs (loop1): Directory bread(block 67) failed [ 71.716258][ T8642] FAT-fs (loop1): Directory bread(block 68) failed [ 71.723369][ T8642] FAT-fs (loop1): Directory bread(block 69) failed [ 71.738975][ T8642] FAT-fs (loop1): Directory bread(block 70) failed [ 71.763820][ T8637] FAT-fs (loop5): Directory bread(block 64) failed [ 71.768548][ T8642] FAT-fs (loop1): Directory bread(block 71) failed 14:41:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 71.791043][ T8642] FAT-fs (loop1): Directory bread(block 72) failed [ 71.797835][ T8637] FAT-fs (loop5): Directory bread(block 65) failed [ 71.806395][ T8641] FAT-fs (loop4): Directory bread(block 64) failed [ 71.807340][ T8642] FAT-fs (loop1): Directory bread(block 73) failed [ 71.844687][ T8637] FAT-fs (loop5): Directory bread(block 66) failed [ 71.845190][ T8641] FAT-fs (loop4): Directory bread(block 65) failed [ 71.858803][ T8641] FAT-fs (loop4): Directory bread(block 66) failed [ 71.863955][ T8637] FAT-fs (loop5): Directory bread(block 67) failed [ 71.872327][ T8641] FAT-fs (loop4): Directory bread(block 67) failed [ 71.877143][ T8637] FAT-fs (loop5): Directory bread(block 68) failed [ 71.880814][ T8641] FAT-fs (loop4): Directory bread(block 68) failed [ 71.894341][ T8641] FAT-fs (loop4): Directory bread(block 69) failed [ 71.903154][ T8641] FAT-fs (loop4): Directory bread(block 70) failed [ 71.910448][ T8637] FAT-fs (loop5): Directory bread(block 69) failed [ 71.917628][ T8637] FAT-fs (loop5): Directory bread(block 70) failed [ 71.925439][ T8641] FAT-fs (loop4): Directory bread(block 71) failed [ 71.992362][ T8641] FAT-fs (loop4): Directory bread(block 72) failed [ 72.006839][ T8637] FAT-fs (loop5): Directory bread(block 71) failed [ 72.028803][ T8641] FAT-fs (loop4): Directory bread(block 73) failed 14:41:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 72.040284][ T8637] FAT-fs (loop5): Directory bread(block 72) failed [ 72.047026][ T8637] FAT-fs (loop5): Directory bread(block 73) failed [ 72.132921][ T8657] FAT-fs (loop3): Directory bread(block 64) failed [ 72.196856][ T8657] FAT-fs (loop3): Directory bread(block 65) failed [ 72.198514][ T8659] FAT-fs (loop0): Directory bread(block 64) failed [ 72.241150][ T8661] FAT-fs (loop2): Directory bread(block 64) failed [ 72.269729][ T8661] FAT-fs (loop2): Directory bread(block 65) failed [ 72.280194][ T8657] FAT-fs (loop3): Directory bread(block 66) failed 14:41:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 72.299017][ T8659] FAT-fs (loop0): Directory bread(block 65) failed [ 72.301821][ T8661] FAT-fs (loop2): Directory bread(block 66) failed [ 72.316348][ T8659] FAT-fs (loop0): Directory bread(block 66) failed [ 72.327307][ T8657] FAT-fs (loop3): Directory bread(block 67) failed [ 72.342172][ T8657] FAT-fs (loop3): Directory bread(block 68) failed 14:41:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 72.349054][ T8661] FAT-fs (loop2): Directory bread(block 67) failed [ 72.359102][ T8659] FAT-fs (loop0): Directory bread(block 67) failed [ 72.369133][ T8657] FAT-fs (loop3): Directory bread(block 69) failed [ 72.382769][ T8661] FAT-fs (loop2): Directory bread(block 68) failed [ 72.392404][ T8661] FAT-fs (loop2): Directory bread(block 69) failed [ 72.413378][ T8657] FAT-fs (loop3): Directory bread(block 70) failed [ 72.415676][ T8659] FAT-fs (loop0): Directory bread(block 68) failed [ 72.422231][ T8657] FAT-fs (loop3): Directory bread(block 71) failed [ 72.427318][ T8661] FAT-fs (loop2): Directory bread(block 70) failed [ 72.437742][ T8657] FAT-fs (loop3): Directory bread(block 72) failed [ 72.440801][ T8659] FAT-fs (loop0): Directory bread(block 69) failed [ 72.452873][ T8657] FAT-fs (loop3): Directory bread(block 73) failed [ 72.463078][ T8659] FAT-fs (loop0): Directory bread(block 70) failed [ 72.470433][ T8659] FAT-fs (loop0): Directory bread(block 71) failed [ 72.477339][ T8661] FAT-fs (loop2): Directory bread(block 71) failed [ 72.486099][ T8659] FAT-fs (loop0): Directory bread(block 72) failed [ 72.494977][ T8659] FAT-fs (loop0): Directory bread(block 73) failed [ 72.495530][ T8661] FAT-fs (loop2): Directory bread(block 72) failed [ 72.509088][ T8661] FAT-fs (loop2): Directory bread(block 73) failed 14:41:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 72.721680][ T8672] FAT-fs (loop1): Directory bread(block 64) failed [ 72.733330][ T8672] FAT-fs (loop1): Directory bread(block 65) failed [ 72.771842][ T8672] FAT-fs (loop1): Directory bread(block 66) failed [ 72.778766][ T8672] FAT-fs (loop1): Directory bread(block 67) failed [ 72.787023][ T8672] FAT-fs (loop1): Directory bread(block 68) failed [ 72.794080][ T8672] FAT-fs (loop1): Directory bread(block 69) failed [ 72.801631][ T8681] FAT-fs (loop4): Directory bread(block 64) failed [ 72.837994][ T8672] FAT-fs (loop1): Directory bread(block 70) failed [ 72.845336][ T8681] FAT-fs (loop4): Directory bread(block 65) failed [ 72.875527][ T8681] FAT-fs (loop4): Directory bread(block 66) failed [ 72.896025][ T8672] FAT-fs (loop1): Directory bread(block 71) failed [ 72.927149][ T8681] FAT-fs (loop4): Directory bread(block 67) failed [ 72.938558][ T8683] FAT-fs (loop5): Directory bread(block 64) failed [ 72.957433][ T8681] FAT-fs (loop4): Directory bread(block 68) failed [ 72.957581][ T8672] FAT-fs (loop1): Directory bread(block 72) failed [ 72.965967][ T8683] FAT-fs (loop5): Directory bread(block 65) failed [ 72.978213][ T8672] FAT-fs (loop1): Directory bread(block 73) failed [ 73.004802][ T8681] FAT-fs (loop4): Directory bread(block 69) failed [ 73.102790][ T8681] FAT-fs (loop4): Directory bread(block 70) failed [ 73.112531][ T8690] FAT-fs (loop2): Directory bread(block 64) failed [ 73.135650][ T8698] FAT-fs (loop0): Directory bread(block 64) failed [ 73.148178][ T8681] FAT-fs (loop4): Directory bread(block 71) failed [ 73.163578][ T8683] FAT-fs (loop5): Directory bread(block 66) failed [ 73.169674][ T8690] FAT-fs (loop2): Directory bread(block 65) failed [ 73.175948][ T8683] FAT-fs (loop5): Directory bread(block 67) failed [ 73.176975][ T8698] FAT-fs (loop0): Directory bread(block 65) failed [ 73.195571][ T8683] FAT-fs (loop5): Directory bread(block 68) failed 14:41:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 73.211337][ T8683] FAT-fs (loop5): Directory bread(block 69) failed [ 73.228039][ T8683] FAT-fs (loop5): Directory bread(block 70) failed [ 73.232290][ T8690] FAT-fs (loop2): Directory bread(block 66) failed [ 73.236992][ T8683] FAT-fs (loop5): Directory bread(block 71) failed [ 73.249028][ T8681] FAT-fs (loop4): Directory bread(block 72) failed [ 73.249832][ T8683] FAT-fs (loop5): Directory bread(block 72) failed [ 73.266987][ T8683] FAT-fs (loop5): Directory bread(block 73) failed [ 73.267118][ T8694] FAT-fs (loop3): Directory bread(block 64) failed [ 73.284892][ T8698] FAT-fs (loop0): Directory bread(block 66) failed [ 73.296933][ T8690] FAT-fs (loop2): Directory bread(block 67) failed [ 73.304490][ T8694] FAT-fs (loop3): Directory bread(block 65) failed [ 73.311435][ T8681] FAT-fs (loop4): Directory bread(block 73) failed [ 73.314235][ T8698] FAT-fs (loop0): Directory bread(block 67) failed [ 73.325577][ T8694] FAT-fs (loop3): Directory bread(block 66) failed [ 73.325827][ T8698] FAT-fs (loop0): Directory bread(block 68) failed [ 73.345899][ T8698] FAT-fs (loop0): Directory bread(block 69) failed [ 73.347346][ T8694] FAT-fs (loop3): Directory bread(block 67) failed [ 73.352806][ T8698] FAT-fs (loop0): Directory bread(block 70) failed [ 73.367503][ T8690] FAT-fs (loop2): Directory bread(block 68) failed [ 73.413975][ T8694] FAT-fs (loop3): Directory bread(block 68) failed [ 73.429626][ T8690] FAT-fs (loop2): Directory bread(block 69) failed [ 73.444442][ T8694] FAT-fs (loop3): Directory bread(block 69) failed 14:41:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 73.462221][ T8698] FAT-fs (loop0): Directory bread(block 71) failed [ 73.479007][ T8690] FAT-fs (loop2): Directory bread(block 70) failed [ 73.497979][ T8694] FAT-fs (loop3): Directory bread(block 70) failed [ 73.506022][ T8698] FAT-fs (loop0): Directory bread(block 72) failed [ 73.540411][ T8694] FAT-fs (loop3): Directory bread(block 71) failed [ 73.540830][ T8698] FAT-fs (loop0): Directory bread(block 73) failed [ 73.549124][ T8690] FAT-fs (loop2): Directory bread(block 71) failed [ 73.609811][ T8694] FAT-fs (loop3): Directory bread(block 72) failed [ 73.622415][ T8708] FAT-fs (loop1): Directory bread(block 64) failed [ 73.635502][ T8690] FAT-fs (loop2): Directory bread(block 72) failed [ 73.643499][ T8694] FAT-fs (loop3): Directory bread(block 73) failed [ 73.652514][ T8708] FAT-fs (loop1): Directory bread(block 65) failed 14:41:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 73.704126][ T8708] FAT-fs (loop1): Directory bread(block 66) failed [ 73.708986][ T8690] FAT-fs (loop2): Directory bread(block 73) failed [ 73.713746][ T8708] FAT-fs (loop1): Directory bread(block 67) failed [ 73.781883][ T8708] FAT-fs (loop1): Directory bread(block 68) failed [ 73.815560][ T8708] FAT-fs (loop1): Directory bread(block 69) failed 14:41:44 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 73.880861][ T8708] FAT-fs (loop1): Directory bread(block 70) failed [ 73.909671][ T8708] FAT-fs (loop1): Directory bread(block 71) failed [ 73.918535][ T8714] FAT-fs (loop5): Directory bread(block 64) failed [ 73.958562][ T8714] FAT-fs (loop5): Directory bread(block 65) failed [ 73.972125][ T8708] FAT-fs (loop1): Directory bread(block 72) failed [ 73.980444][ T8714] FAT-fs (loop5): Directory bread(block 66) failed [ 73.989565][ T8714] FAT-fs (loop5): Directory bread(block 67) failed [ 73.993883][ T8708] FAT-fs (loop1): Directory bread(block 73) failed 14:41:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 73.998910][ T8714] FAT-fs (loop5): Directory bread(block 68) failed [ 74.016727][ T8714] FAT-fs (loop5): Directory bread(block 69) failed [ 74.025010][ T8714] FAT-fs (loop5): Directory bread(block 70) failed [ 74.033080][ T8714] FAT-fs (loop5): Directory bread(block 71) failed [ 74.045438][ T8714] FAT-fs (loop5): Directory bread(block 72) failed [ 74.092798][ T8721] FAT-fs (loop4): Directory bread(block 64) failed [ 74.096776][ T8714] FAT-fs (loop5): Directory bread(block 73) failed [ 74.106906][ T8721] FAT-fs (loop4): Directory bread(block 65) failed [ 74.122417][ T8721] FAT-fs (loop4): Directory bread(block 66) failed [ 74.167032][ T8732] overlayfs: failed to resolve 'fiXe0': -2 [ 74.179702][ T8721] FAT-fs (loop4): Directory bread(block 67) failed [ 74.186523][ T8721] FAT-fs (loop4): Directory bread(block 68) failed [ 74.219491][ T8734] overlayfs: failed to resolve 'fiXe0': -2 14:41:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) 14:41:45 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 74.343294][ T8727] FAT-fs (loop0): Directory bread(block 64) failed [ 74.357833][ T8727] FAT-fs (loop0): Directory bread(block 65) failed [ 74.366997][ T8721] FAT-fs (loop4): Directory bread(block 69) failed [ 74.378598][ T8727] FAT-fs (loop0): Directory bread(block 66) failed [ 74.380013][ T8721] FAT-fs (loop4): Directory bread(block 70) failed 14:41:45 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 74.394441][ T8741] overlayfs: failed to resolve 'fiXe0': -2 [ 74.398097][ T8727] FAT-fs (loop0): Directory bread(block 67) failed [ 74.404911][ T8721] FAT-fs (loop4): Directory bread(block 71) failed [ 74.433046][ T8727] FAT-fs (loop0): Directory bread(block 68) failed [ 74.464325][ T8721] FAT-fs (loop4): Directory bread(block 72) failed [ 74.470203][ T8727] FAT-fs (loop0): Directory bread(block 69) failed [ 74.498755][ T8721] FAT-fs (loop4): Directory bread(block 73) failed [ 74.499451][ T8727] FAT-fs (loop0): Directory bread(block 70) failed 14:41:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 74.519542][ T8743] overlayfs: failed to resolve 'fiXe0': -2 [ 74.551842][ T8727] FAT-fs (loop0): Directory bread(block 71) failed [ 74.575832][ T8727] FAT-fs (loop0): Directory bread(block 72) failed 14:41:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 74.646192][ T8727] FAT-fs (loop0): Directory bread(block 73) failed 14:41:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 74.772879][ T8754] overlayfs: failed to resolve 'fiXe0': -2 [ 74.780565][ T8747] FAT-fs (loop1): Directory bread(block 64) failed [ 74.781222][ T8752] overlayfs: failed to resolve 'fiXe0': -2 [ 74.788006][ T8747] FAT-fs (loop1): Directory bread(block 65) failed 14:41:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 74.817756][ T8760] overlayfs: failed to resolve 'fiXe0': -2 [ 74.831295][ T8747] FAT-fs (loop1): Directory bread(block 66) failed [ 74.842866][ T8747] FAT-fs (loop1): Directory bread(block 67) failed [ 74.857149][ T8747] FAT-fs (loop1): Directory bread(block 68) failed 14:41:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 74.878415][ T8747] FAT-fs (loop1): Directory bread(block 69) failed [ 74.892294][ T8747] FAT-fs (loop1): Directory bread(block 70) failed [ 74.900812][ T8747] FAT-fs (loop1): Directory bread(block 71) failed [ 74.918246][ T8747] FAT-fs (loop1): Directory bread(block 72) failed 14:41:46 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) 14:41:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 74.969859][ T8747] FAT-fs (loop1): Directory bread(block 73) failed [ 75.133781][ T8766] FAT-fs (loop0): Directory bread(block 64) failed [ 75.173811][ T8766] FAT-fs (loop0): Directory bread(block 65) failed 14:41:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 75.201512][ T8764] FAT-fs (loop4): Directory bread(block 64) failed [ 75.208304][ T8764] FAT-fs (loop4): Directory bread(block 65) failed [ 75.226675][ T8775] overlayfs: failed to resolve 'fiXe0': -2 [ 75.242355][ T8777] overlayfs: failed to resolve 'fiXe0': -2 [ 75.249653][ T8766] FAT-fs (loop0): Directory bread(block 66) failed [ 75.260629][ T8764] FAT-fs (loop4): Directory bread(block 66) failed [ 75.266064][ T8766] FAT-fs (loop0): Directory bread(block 67) failed [ 75.281399][ T8766] FAT-fs (loop0): Directory bread(block 68) failed [ 75.285090][ T8781] overlayfs: failed to resolve 'fiXe0': -2 14:41:46 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 75.300786][ T8766] FAT-fs (loop0): Directory bread(block 69) failed [ 75.323948][ T8764] FAT-fs (loop4): Directory bread(block 67) failed [ 75.331273][ T8766] FAT-fs (loop0): Directory bread(block 70) failed [ 75.331377][ T8766] FAT-fs (loop0): Directory bread(block 71) failed [ 75.331897][ T8766] FAT-fs (loop0): Directory bread(block 72) failed [ 75.352317][ T8764] FAT-fs (loop4): Directory bread(block 68) failed [ 75.352440][ T8764] FAT-fs (loop4): Directory bread(block 69) failed [ 75.352560][ T8764] FAT-fs (loop4): Directory bread(block 70) failed [ 75.352683][ T8764] FAT-fs (loop4): Directory bread(block 71) failed 14:41:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) 14:41:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 75.445242][ T8785] overlayfs: failed to resolve 'fiXe0': -2 [ 75.446850][ T8766] FAT-fs (loop0): Directory bread(block 73) failed [ 75.463186][ T8764] FAT-fs (loop4): Directory bread(block 72) failed [ 75.539114][ T8764] FAT-fs (loop4): Directory bread(block 73) failed [ 75.565043][ T8790] overlayfs: failed to resolve 'fiXe0': -2 [ 75.586272][ T8794] overlayfs: failed to resolve 'fiXe0': -2 14:41:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 75.612169][ T8787] FAT-fs (loop1): Directory bread(block 64) failed 14:41:46 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) 14:41:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:fiXe0,workdir=./file1']) [ 75.669940][ T8787] FAT-fs (loop1): Directory bread(block 65) failed [ 75.676749][ T8787] FAT-fs (loop1): Directory bread(block 66) failed 14:41:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:41:46 executing program 5: getpriority(0x3, 0x0) [ 75.811864][ T8787] FAT-fs (loop1): Directory bread(block 67) failed [ 75.834051][ T8802] overlayfs: failed to resolve 'fiXe0': -2 [ 75.843474][ T8805] overlayfs: failed to resolve 'fiXe0': -2 [ 75.846408][ T8787] FAT-fs (loop1): Directory bread(block 68) failed 14:41:46 executing program 5: getpriority(0x3, 0x0) [ 75.861264][ T8787] FAT-fs (loop1): Directory bread(block 69) failed [ 75.927863][ T8787] FAT-fs (loop1): Directory bread(block 70) failed [ 75.979774][ T8807] FAT-fs (loop0): Directory bread(block 64) failed [ 75.988595][ T8787] FAT-fs (loop1): Directory bread(block 71) failed 14:41:47 executing program 5: getpriority(0x3, 0x0) 14:41:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@discard_size={'discard'}}]}) [ 76.044191][ T8807] FAT-fs (loop0): Directory bread(block 65) failed [ 76.067562][ T8787] FAT-fs (loop1): Directory bread(block 72) failed [ 76.079927][ T8807] FAT-fs (loop0): Directory bread(block 66) failed [ 76.122065][ T8807] FAT-fs (loop0): Directory bread(block 67) failed [ 76.134415][ T8787] FAT-fs (loop1): Directory bread(block 73) failed [ 76.150959][ T8823] JFS: discard option not supported on device [ 76.175053][ T8807] FAT-fs (loop0): Directory bread(block 68) failed [ 76.225458][ T8807] FAT-fs (loop0): Directory bread(block 69) failed [ 76.232602][ T8807] FAT-fs (loop0): Directory bread(block 70) failed [ 76.250979][ T8817] FAT-fs (loop4): Directory bread(block 64) failed [ 76.258279][ T8807] FAT-fs (loop0): Directory bread(block 71) failed [ 76.275355][ T8817] FAT-fs (loop4): Directory bread(block 65) failed [ 76.283330][ T8823] JFS: discard option not supported on device [ 76.295040][ T8817] FAT-fs (loop4): Directory bread(block 66) failed [ 76.300005][ T8807] FAT-fs (loop0): Directory bread(block 72) failed 14:41:47 executing program 5: getpriority(0x3, 0x0) 14:41:47 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe000000008500000007000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 76.326623][ T8807] FAT-fs (loop0): Directory bread(block 73) failed [ 76.330028][ T8817] FAT-fs (loop4): Directory bread(block 67) failed 14:41:47 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) [ 76.353057][ T8817] FAT-fs (loop4): Directory bread(block 68) failed [ 76.381371][ T8817] FAT-fs (loop4): Directory bread(block 69) failed [ 76.432197][ T8817] FAT-fs (loop4): Directory bread(block 70) failed 14:41:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@discard_size={'discard'}}]}) 14:41:47 executing program 0: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) [ 76.477415][ T8817] FAT-fs (loop4): Directory bread(block 71) failed [ 76.496166][ T8817] FAT-fs (loop4): Directory bread(block 72) failed 14:41:47 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) [ 76.534471][ T8817] FAT-fs (loop4): Directory bread(block 73) failed [ 76.731874][ T8857] JFS: discard option not supported on device 14:41:47 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:47 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe000000008500000007000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:41:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@discard_size={'discard'}}]}) 14:41:48 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe000000008500000007000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:41:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:48 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) [ 77.232711][ T8886] JFS: discard option not supported on device 14:41:48 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:48 executing program 0: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe000000008500000007000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:41:48 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@discard_size={'discard'}}]}) 14:41:48 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) 14:41:48 executing program 5: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:48 executing program 1: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) [ 77.783706][ T8926] JFS: discard option not supported on device 14:41:49 executing program 5: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:49 executing program 4: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:49 executing program 3: futex(0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 14:41:49 executing program 4: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:49 executing program 0: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:49 executing program 3: futex(0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 14:41:49 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:49 executing program 4: r0 = fsopen(&(0x7f0000000100)='bpf\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000180)=',\x00', &(0x7f00000001c0)='./file0\x00', r1) 14:41:49 executing program 1: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:49 executing program 3: futex(0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 14:41:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xd, 0x0, 0x0, 0x0, 0x8}, 0x3c) 14:41:50 executing program 3: futex(0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 14:41:50 executing program 5: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xd, 0x0, 0x0, 0x0, 0x8}, 0x3c) 14:41:50 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xd, 0x0, 0x0, 0x0, 0x8}, 0x3c) 14:41:50 executing program 0: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:50 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:50 executing program 1: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xd, 0x0, 0x0, 0x0, 0x8}, 0x3c) 14:41:51 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 5: geteuid() setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaa9b7, &(0x7f0000000480)) 14:41:51 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:51 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:52 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:53 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:53 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:53 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:53 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:41:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) [ 82.248745][ T9051] IPVS: ftp: loaded support on port[0] = 21 [ 82.444669][ T9051] chnl_net:caif_netlink_parms(): no params data found [ 82.568524][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.575805][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.583643][ T9051] device bridge_slave_0 entered promiscuous mode [ 82.592131][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.596410][ T9054] IPVS: ftp: loaded support on port[0] = 21 [ 82.599623][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.613027][ T9051] device bridge_slave_1 entered promiscuous mode [ 82.694434][ T9051] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 82.706253][ T9051] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 82.731158][ T9051] team0: Port device team_slave_0 added [ 82.797427][ T9051] team0: Port device team_slave_1 added [ 82.872313][ T9051] device hsr_slave_0 entered promiscuous mode [ 82.909721][ T9051] device hsr_slave_1 entered promiscuous mode [ 82.954677][ T7] device bridge_slave_1 left promiscuous mode [ 82.965190][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.012540][ T7] device bridge_slave_0 left promiscuous mode [ 83.018708][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.832559][ T7] device hsr_slave_1 left promiscuous mode [ 84.883361][ T7] device hsr_slave_0 left promiscuous mode [ 84.945591][ T7] team0 (unregistering): Port device team_slave_1 removed [ 84.957786][ T7] team0 (unregistering): Port device team_slave_0 removed [ 84.970099][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 85.034799][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 85.114473][ T7] bond0 (unregistering): Released all slaves [ 85.241975][ T9060] IPVS: ftp: loaded support on port[0] = 21 [ 85.245085][ T9061] IPVS: ftp: loaded support on port[0] = 21 [ 85.261271][ T9056] IPVS: ftp: loaded support on port[0] = 21 [ 85.282142][ T9062] IPVS: ftp: loaded support on port[0] = 21 [ 85.468127][ T9054] chnl_net:caif_netlink_parms(): no params data found [ 85.667735][ T9054] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.678688][ T9054] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.688854][ T9054] device bridge_slave_0 entered promiscuous mode [ 85.743093][ T9054] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.754079][ T9054] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.764979][ T9054] device bridge_slave_1 entered promiscuous mode [ 85.775863][ T9056] chnl_net:caif_netlink_parms(): no params data found [ 85.805661][ T9051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.828524][ T9060] chnl_net:caif_netlink_parms(): no params data found [ 85.875772][ T9062] chnl_net:caif_netlink_parms(): no params data found [ 85.928203][ T9054] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 85.974454][ T9051] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.011197][ T9061] chnl_net:caif_netlink_parms(): no params data found [ 86.026863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.040039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.064910][ T9054] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 86.095999][ T9054] team0: Port device team_slave_0 added [ 86.153173][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.170033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.188898][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.196007][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.214944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.228547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.247478][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.254588][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.306508][ T9056] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.320523][ T9056] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.338878][ T9056] device bridge_slave_0 entered promiscuous mode [ 86.359178][ T9060] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.368083][ T9060] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.386831][ T9060] device bridge_slave_0 entered promiscuous mode [ 86.410423][ T9054] team0: Port device team_slave_1 added [ 86.430928][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.438905][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.448785][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.457534][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.466658][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.475432][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.483975][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.494718][ T9056] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.502195][ T9056] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.513741][ T9056] device bridge_slave_1 entered promiscuous mode [ 86.533325][ T9062] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.547046][ T9062] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.555025][ T9062] device bridge_slave_0 entered promiscuous mode [ 86.563639][ T9062] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.571137][ T9062] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.578727][ T9062] device bridge_slave_1 entered promiscuous mode [ 86.586103][ T9060] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.593703][ T9060] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.602036][ T9060] device bridge_slave_1 entered promiscuous mode [ 86.621827][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.635394][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.643916][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.652568][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.660917][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.692130][ T9056] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 86.721361][ T9060] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 86.734402][ T9051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.753323][ T9061] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.762028][ T9061] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.770592][ T9061] device bridge_slave_0 entered promiscuous mode [ 86.780109][ T9056] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 86.793115][ T9061] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.800672][ T9061] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.808600][ T9061] device bridge_slave_1 entered promiscuous mode [ 86.862334][ T9054] device hsr_slave_0 entered promiscuous mode [ 86.903926][ T9054] device hsr_slave_1 entered promiscuous mode [ 86.961570][ T9060] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 86.994268][ T9060] team0: Port device team_slave_0 added [ 87.005181][ T9060] team0: Port device team_slave_1 added [ 87.014222][ T9062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 87.028281][ T9062] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 87.067634][ T9051] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.102863][ T9062] team0: Port device team_slave_0 added [ 87.120449][ T9056] team0: Port device team_slave_0 added [ 87.128248][ T9061] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 87.202166][ T9060] device hsr_slave_0 entered promiscuous mode [ 87.219921][ T9060] device hsr_slave_1 entered promiscuous mode [ 87.240993][ T9062] team0: Port device team_slave_1 added [ 87.247890][ T9056] team0: Port device team_slave_1 added [ 87.273075][ T9061] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:41:58 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 87.391402][ T9056] device hsr_slave_0 entered promiscuous mode [ 87.429674][ T9056] device hsr_slave_1 entered promiscuous mode [ 87.485122][ T9061] team0: Port device team_slave_0 added [ 87.492938][ T9061] team0: Port device team_slave_1 added [ 87.541851][ T9062] device hsr_slave_0 entered promiscuous mode [ 87.580252][ T9062] device hsr_slave_1 entered promiscuous mode [ 87.921044][ T9061] device hsr_slave_0 entered promiscuous mode [ 87.969762][ T9061] device hsr_slave_1 entered promiscuous mode 14:41:59 executing program 2: syslog(0x3, &(0x7f0000000000)=""/3, 0x3) [ 88.053481][ T9054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.118110][ T9054] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.150730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.161041][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:41:59 executing program 2: futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x0) [ 88.212017][ T9061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.220284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.237316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.246220][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.253442][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.294751][ T9061] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.306167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.315585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.324394][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.332813][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.341361][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.350147][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.358720][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.367668][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.375494][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.385890][ T9056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.411263][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.424809][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.433775][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.442639][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.451117][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.459551][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.469853][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.482870][ T9060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.497797][ T9056] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.286300][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.304448][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.317296][ T9077] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.324454][ T9077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.342331][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.353961][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.362010][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.370897][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.379426][ T9077] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.386465][ T9077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.412253][ T9054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 89.428043][ T9062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.445419][ T9079] IPVS: ftp: loaded support on port[0] = 21 [ 89.457361][ T9060] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.469928][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.477789][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.490929][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.498560][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.508978][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.518715][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.527282][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.535830][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.544949][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.553410][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.561908][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.570293][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.578762][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.587384][ T9076] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.594472][ T9076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.602784][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.611605][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.620084][ T9076] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.627116][ T9076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.634788][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.643100][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.055410][ T9061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 90.068230][ T9061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.076286][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.084195][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.092169][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.100014][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.107627][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.116504][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.125374][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.133747][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.142501][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.150918][ T8471] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.157983][ T8471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.166211][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.177667][ T9062] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.596434][ T9061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.615298][ T9054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.623939][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.640135][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.648814][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.665771][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.674956][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.683571][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.692603][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.701258][ T9077] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.708293][ T9077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.715942][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.144599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.156291][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.172376][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.182595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.191276][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.200059][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.208360][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.215584][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.223321][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.233574][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.242045][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.249076][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.256748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.265747][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.274364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.283093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.293128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.301872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.310391][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.318581][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.328853][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.336706][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.348884][ T9056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.390860][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.413613][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.424655][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.440567][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.449035][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.458755][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.467448][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.475833][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.505077][ T9056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.537199][ T9062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:42:02 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 91.570401][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.590113][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.598610][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.615130][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.630062][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.638392][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:42:02 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:02 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) [ 92.212803][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.807048][ T9062] 8021q: adding VLAN 0 to HW filter on device batadv0 14:42:04 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:42:04 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) [ 93.601873][ T9060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.046463][ T9079] chnl_net:caif_netlink_parms(): no params data found 14:42:05 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:42:05 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:42:05 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:05 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:42:05 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:05 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) [ 95.180588][ T9079] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.187694][ T9079] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.202847][ T9079] device bridge_slave_0 entered promiscuous mode [ 95.213677][ T7] device bridge_slave_1 left promiscuous mode [ 95.239439][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.280268][ T7] device bridge_slave_0 left promiscuous mode [ 95.286431][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.331296][ T7] device bridge_slave_1 left promiscuous mode [ 95.337520][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.390520][ T7] device bridge_slave_0 left promiscuous mode [ 95.396746][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.440700][ T7] device bridge_slave_1 left promiscuous mode [ 95.446872][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.511078][ T7] device bridge_slave_0 left promiscuous mode [ 95.517400][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.571211][ T7] device bridge_slave_1 left promiscuous mode [ 95.577413][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.640775][ T7] device bridge_slave_0 left promiscuous mode [ 95.646962][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.711271][ T7] device bridge_slave_1 left promiscuous mode [ 95.717493][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.752089][ T7] device bridge_slave_0 left promiscuous mode [ 95.758307][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.791268][ T7] device bridge_slave_1 left promiscuous mode [ 95.797494][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.860358][ T7] device bridge_slave_0 left promiscuous mode [ 95.866581][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.492434][ T7] device hsr_slave_1 left promiscuous mode [ 106.554843][ T7] device hsr_slave_0 left promiscuous mode [ 106.614579][ T7] team0 (unregistering): Port device team_slave_1 removed [ 106.628069][ T7] team0 (unregistering): Port device team_slave_0 removed [ 106.639735][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 106.715389][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 106.817891][ T7] bond0 (unregistering): Released all slaves [ 106.942894][ T7] device hsr_slave_1 left promiscuous mode [ 106.994974][ T7] device hsr_slave_0 left promiscuous mode [ 107.054574][ T7] team0 (unregistering): Port device team_slave_1 removed [ 107.067127][ T7] team0 (unregistering): Port device team_slave_0 removed [ 107.079970][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 107.145684][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 107.218510][ T7] bond0 (unregistering): Released all slaves [ 107.391716][ T7] device hsr_slave_1 left promiscuous mode [ 107.444951][ T7] device hsr_slave_0 left promiscuous mode [ 107.516486][ T7] team0 (unregistering): Port device team_slave_1 removed [ 107.527988][ T7] team0 (unregistering): Port device team_slave_0 removed [ 107.539136][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 107.597999][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 107.696142][ T7] bond0 (unregistering): Released all slaves [ 107.841612][ T7] device hsr_slave_1 left promiscuous mode [ 107.893020][ T7] device hsr_slave_0 left promiscuous mode [ 107.945081][ T7] team0 (unregistering): Port device team_slave_1 removed [ 107.956624][ T7] team0 (unregistering): Port device team_slave_0 removed [ 107.967916][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 108.006358][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 108.096470][ T7] bond0 (unregistering): Released all slaves [ 108.252623][ T7] device hsr_slave_1 left promiscuous mode [ 108.314925][ T7] device hsr_slave_0 left promiscuous mode [ 108.374455][ T7] team0 (unregistering): Port device team_slave_1 removed [ 108.386620][ T7] team0 (unregistering): Port device team_slave_0 removed [ 108.401032][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 108.426396][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 108.503799][ T7] bond0 (unregistering): Released all slaves [ 108.681723][ T7] device hsr_slave_1 left promiscuous mode [ 108.734747][ T7] device hsr_slave_0 left promiscuous mode [ 108.794440][ T7] team0 (unregistering): Port device team_slave_1 removed [ 108.805970][ T7] team0 (unregistering): Port device team_slave_0 removed [ 108.817133][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 108.855358][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 108.947548][ T7] bond0 (unregistering): Released all slaves [ 109.059675][ T9079] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.066748][ T9079] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.075874][ T9079] device bridge_slave_1 entered promiscuous mode [ 109.096672][ T9079] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.112267][ T9079] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.126667][ T9157] IPVS: ftp: loaded support on port[0] = 21 [ 109.148430][ T9079] team0: Port device team_slave_0 added [ 109.157179][ T9079] team0: Port device team_slave_1 added [ 109.160124][ T9156] IPVS: ftp: loaded support on port[0] = 21 [ 109.272344][ T9079] device hsr_slave_0 entered promiscuous mode [ 109.310512][ T9079] device hsr_slave_1 entered promiscuous mode [ 109.453229][ T9157] chnl_net:caif_netlink_parms(): no params data found [ 109.522768][ T9156] chnl_net:caif_netlink_parms(): no params data found [ 109.541713][ T9157] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.548843][ T9157] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.557381][ T9157] device bridge_slave_0 entered promiscuous mode [ 109.568317][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.576284][ T9157] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.584412][ T9157] device bridge_slave_1 entered promiscuous mode [ 109.606149][ T9157] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.636214][ T9157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.658994][ T9156] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.668428][ T9156] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.676815][ T9156] device bridge_slave_0 entered promiscuous mode [ 109.688897][ T9156] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.696835][ T9156] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.705059][ T9156] device bridge_slave_1 entered promiscuous mode [ 109.723228][ T9156] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.735641][ T9157] team0: Port device team_slave_0 added [ 109.743042][ T9156] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.762511][ T9157] team0: Port device team_slave_1 added [ 109.784528][ T9156] team0: Port device team_slave_0 added [ 109.793262][ T9156] team0: Port device team_slave_1 added [ 109.851170][ T9156] device hsr_slave_0 entered promiscuous mode [ 109.889635][ T9156] device hsr_slave_1 entered promiscuous mode [ 109.933698][ T9079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.982669][ T9157] device hsr_slave_0 entered promiscuous mode [ 110.019805][ T9157] device hsr_slave_1 entered promiscuous mode [ 110.078193][ T9079] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.094260][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 110.113079][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.121251][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.141865][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.152315][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.161326][ T8498] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.168368][ T8498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.176703][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.185235][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.193689][ T8498] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.200772][ T8498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.208847][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.230768][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.249465][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.258056][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.266944][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.275784][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.284975][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.293437][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.301711][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.326670][ T9079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 110.338555][ T9079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.346548][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.355051][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.364029][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.408178][ T9157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.434011][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.442525][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.454069][ T9157] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.463852][ T9079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.476944][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.491544][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.501666][ T8471] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.508746][ T8471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.523954][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.547309][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.556058][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.564673][ T8498] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.571776][ T8498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.580589][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.589091][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.605813][ T9156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.630172][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.638698][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.648463][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.659149][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.678486][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 14:42:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) [ 110.700831][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.709009][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.732019][ T9156] 8021q: adding VLAN 0 to HW filter on device team0 14:42:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:21 executing program 2: futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x0) 14:42:21 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 110.747020][ T9157] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 110.769947][ T9157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 110.814891][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.826463][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.837346][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.847475][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.856834][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:42:21 executing program 2: futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x0) 14:42:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:22 executing program 2: futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x0) [ 110.979731][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.001611][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.046650][ T8498] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.053806][ T8498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.061919][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.079961][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.090687][ T8498] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.097751][ T8498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.128244][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.138035][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.329692][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.338548][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.357433][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.367938][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.384834][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.402084][ T9157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 111.417609][ T9156] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 111.444907][ T9156] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.476339][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.484841][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.497405][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.514028][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.527163][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.543791][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.596723][ T9156] 8021q: adding VLAN 0 to HW filter on device batadv0 14:42:22 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:22 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x800000000000001) 14:42:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0xc008, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:23 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) [ 112.784966][ T9216] IPVS: ftp: loaded support on port[0] = 21 [ 112.801162][ T9211] IPVS: ftp: loaded support on port[0] = 21 [ 113.093905][ T9216] chnl_net:caif_netlink_parms(): no params data found [ 113.134389][ T9211] chnl_net:caif_netlink_parms(): no params data found [ 113.157957][ T9216] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.165378][ T9216] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.173690][ T9216] device bridge_slave_0 entered promiscuous mode [ 113.185856][ T9216] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.194129][ T9216] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.202680][ T9216] device bridge_slave_1 entered promiscuous mode [ 113.233611][ T9216] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 113.248782][ T9216] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 113.265419][ T9211] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.272832][ T9211] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.280897][ T9211] device bridge_slave_0 entered promiscuous mode [ 113.294430][ T9211] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.310881][ T9211] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.318972][ T9211] device bridge_slave_1 entered promiscuous mode [ 113.343665][ T9216] team0: Port device team_slave_0 added [ 113.354904][ T9216] team0: Port device team_slave_1 added [ 113.442180][ T9216] device hsr_slave_0 entered promiscuous mode [ 113.479914][ T9216] device hsr_slave_1 entered promiscuous mode [ 113.562071][ T9211] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 113.573510][ T9216] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.580634][ T9216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.587970][ T9216] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.595082][ T9216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.611169][ T9211] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 113.646195][ T9211] team0: Port device team_slave_0 added [ 113.683994][ T9211] team0: Port device team_slave_1 added [ 113.715342][ T9216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.745223][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.771234][ T3460] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.779770][ T3460] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.852277][ T9211] device hsr_slave_0 entered promiscuous mode [ 113.919752][ T9211] device hsr_slave_1 entered promiscuous mode [ 113.972940][ T9216] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.008227][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.017423][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.026467][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.033572][ T3460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.060750][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.079675][ T9076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.098222][ T9076] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.105339][ T9076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.152859][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.161816][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.181039][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.190026][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.198281][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.207150][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.216131][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 114.232592][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.241399][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.250192][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.261336][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.284190][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.311647][ T9211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.348360][ T9216] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 114.365830][ T9211] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.378488][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.387158][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.396006][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.405579][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.414223][ T9077] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.421338][ T9077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.431085][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.438923][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.447434][ T9077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.456529][ T9077] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.463634][ T9077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.482785][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.522927][ T9211] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 114.534073][ T9211] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 114.547210][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.565643][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.595709][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.604401][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.613298][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.622350][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.631254][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.642119][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.650498][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.658972][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 114.667577][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.687518][ T9211] 8021q: adding VLAN 0 to HW filter on device batadv0 14:42:25 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x1, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 14:42:25 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:25 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:25 executing program 4: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:25 executing program 3: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:25 executing program 0: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 1: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 1: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 1: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:26 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) [ 116.836187][ T9298] IPVS: ftp: loaded support on port[0] = 21 [ 116.851746][ T9299] IPVS: ftp: loaded support on port[0] = 21 [ 118.122992][ T9298] chnl_net:caif_netlink_parms(): no params data found [ 118.584885][ T9299] chnl_net:caif_netlink_parms(): no params data found [ 118.604510][ T9298] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.612986][ T9298] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.621225][ T9298] device bridge_slave_0 entered promiscuous mode [ 119.023295][ T9298] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.030604][ T9298] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.038252][ T9298] device bridge_slave_1 entered promiscuous mode [ 119.458084][ T9298] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.468671][ T9298] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.908153][ T9298] team0: Port device team_slave_0 added [ 119.914188][ T9299] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.921434][ T9299] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.929181][ T9299] device bridge_slave_0 entered promiscuous mode [ 119.937701][ T9298] team0: Port device team_slave_1 added [ 119.950475][ T9299] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.957668][ T9299] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.965415][ T9299] device bridge_slave_1 entered promiscuous mode [ 120.421663][ T9298] device hsr_slave_0 entered promiscuous mode [ 120.449699][ T9298] device hsr_slave_1 entered promiscuous mode [ 120.517101][ T7] device bridge_slave_1 left promiscuous mode [ 120.523609][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.570439][ T7] device bridge_slave_0 left promiscuous mode [ 120.576650][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.631378][ T7] device bridge_slave_1 left promiscuous mode [ 120.637586][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.691371][ T7] device bridge_slave_0 left promiscuous mode [ 120.697598][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.752311][ T7] device bridge_slave_1 left promiscuous mode [ 120.758542][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.810019][ T7] device bridge_slave_0 left promiscuous mode [ 120.816193][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.881295][ T7] device bridge_slave_1 left promiscuous mode [ 120.887515][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.941231][ T7] device bridge_slave_0 left promiscuous mode [ 120.947457][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.001833][ T7] device bridge_slave_1 left promiscuous mode [ 121.008058][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.070475][ T7] device bridge_slave_0 left promiscuous mode [ 121.088357][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.131382][ T7] device bridge_slave_1 left promiscuous mode [ 121.137603][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.181116][ T7] device bridge_slave_0 left promiscuous mode [ 121.187280][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.792437][ T7] device hsr_slave_1 left promiscuous mode [ 131.834290][ T7] device hsr_slave_0 left promiscuous mode [ 131.894397][ T7] team0 (unregistering): Port device team_slave_1 removed [ 131.905915][ T7] team0 (unregistering): Port device team_slave_0 removed [ 131.917176][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 131.957960][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 132.060851][ T7] bond0 (unregistering): Released all slaves [ 132.202515][ T7] device hsr_slave_1 left promiscuous mode [ 132.254889][ T7] device hsr_slave_0 left promiscuous mode [ 132.316340][ T7] team0 (unregistering): Port device team_slave_1 removed [ 132.327908][ T7] team0 (unregistering): Port device team_slave_0 removed [ 132.341813][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 132.386900][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 132.477727][ T7] bond0 (unregistering): Released all slaves [ 132.632693][ T7] device hsr_slave_1 left promiscuous mode [ 132.694812][ T7] device hsr_slave_0 left promiscuous mode [ 132.756300][ T7] team0 (unregistering): Port device team_slave_1 removed [ 132.771136][ T7] team0 (unregistering): Port device team_slave_0 removed [ 132.783606][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 132.854953][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 132.924597][ T7] bond0 (unregistering): Released all slaves [ 133.033247][ T7] device hsr_slave_1 left promiscuous mode [ 133.073492][ T7] device hsr_slave_0 left promiscuous mode [ 133.133191][ T7] team0 (unregistering): Port device team_slave_1 removed [ 133.147978][ T7] team0 (unregistering): Port device team_slave_0 removed [ 133.159263][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 133.214095][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 133.308801][ T7] bond0 (unregistering): Released all slaves [ 133.451450][ T7] device hsr_slave_1 left promiscuous mode [ 133.524742][ T7] device hsr_slave_0 left promiscuous mode [ 133.585014][ T7] team0 (unregistering): Port device team_slave_1 removed [ 133.596721][ T7] team0 (unregistering): Port device team_slave_0 removed [ 133.607906][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 133.646338][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 133.738722][ T7] bond0 (unregistering): Released all slaves [ 133.922666][ T7] device hsr_slave_1 left promiscuous mode [ 133.984858][ T7] device hsr_slave_0 left promiscuous mode [ 134.054370][ T7] team0 (unregistering): Port device team_slave_1 removed [ 134.065887][ T7] team0 (unregistering): Port device team_slave_0 removed [ 134.077008][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 134.134449][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 134.213569][ T7] bond0 (unregistering): Released all slaves [ 134.331296][ T9299] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 134.344899][ T9299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 134.366682][ T9299] team0: Port device team_slave_0 added [ 134.375668][ T9299] team0: Port device team_slave_1 added [ 134.442321][ T9299] device hsr_slave_0 entered promiscuous mode [ 134.479591][ T9299] device hsr_slave_1 entered promiscuous mode [ 134.605927][ T9299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.636231][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.645715][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.656923][ T9299] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.667108][ T9298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.685953][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.694904][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.703421][ T8471] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.710509][ T8471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.727966][ T9298] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.737009][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.745129][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.753674][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.762356][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.771642][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.780444][ T9239] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.787484][ T9239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.798691][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.823347][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.832566][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.841041][ T9239] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.848200][ T9239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.856338][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.865123][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.873588][ T9239] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.880682][ T9239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.888389][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.897058][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.905631][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.927849][ T9299] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 134.940340][ T9299] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 134.954128][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.962334][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.971174][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.979890][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.988281][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.997452][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.006830][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.015114][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.023909][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.032768][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.040556][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.048350][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.070685][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.079007][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.087775][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.096283][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.108139][ T9299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.119191][ T9298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.142357][ T9298] 8021q: adding VLAN 0 to HW filter on device batadv0 14:42:46 executing program 4: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 1: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 0: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 3: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 1: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 3: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:46 executing program 4: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:47 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:47 executing program 1: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:47 executing program 3: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:47 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') [ 136.658257][ T9377] IPVS: ftp: loaded support on port[0] = 21 [ 136.800438][ T9377] chnl_net:caif_netlink_parms(): no params data found [ 136.861141][ T9377] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.868278][ T9377] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.883136][ T9377] device bridge_slave_0 entered promiscuous mode [ 136.896610][ T9377] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.907583][ T9377] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.922523][ T9377] device bridge_slave_1 entered promiscuous mode [ 136.957963][ T9377] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.975754][ T9377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 137.008235][ T9377] team0: Port device team_slave_0 added [ 137.025242][ T9377] team0: Port device team_slave_1 added [ 137.096708][ T9377] device hsr_slave_0 entered promiscuous mode [ 137.189722][ T9377] device hsr_slave_1 entered promiscuous mode [ 137.251221][ T9377] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.258334][ T9377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.265745][ T9377] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.272822][ T9377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.323800][ T9377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.338332][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.347351][ T3460] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.355531][ T3460] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.364451][ T3460] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 137.376884][ T9377] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.390787][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.399108][ T9239] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.406187][ T9239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.424118][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.433190][ T9239] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.440303][ T9239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.460714][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.469958][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.478457][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.492381][ T9377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 137.507800][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.516898][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.525412][ T9239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.548032][ T9377] 8021q: adding VLAN 0 to HW filter on device batadv0 14:42:48 executing program 0: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:48 executing program 3: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:48 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb84, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:42:48 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:48 executing program 2: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:48 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:48 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb84, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 3: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000c1860000000200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x5, @empty, 0x8}}}, 0x80, &(0x7f0000000840)}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) setregid(0x0, 0x0) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0xac, 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x8) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000480)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}}, 0x24) 14:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb84, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:42:49 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb84, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:42:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:51 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:51 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6100, 0x0) 14:42:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='proc\x00;\xf8Zp\xbb\xdc\x89Z\x82p\xd2\xeaj\xe7I\xfd\xd8\x98\x11\xadw\xb0\xde\xab\xbcr\xaa\xaa\xdc1\xea`\xe8\xffad(\xa5]h\xf4\xdes\xc6\xbd\xbf\xa3\x1b\x9b\tu\x8a\xb9F\xe2\x9b\x98\xc2\x03\xd3\xbd>`\xf0(\xdaK\xe2\xd8^a\xc5aP\xf9\x992\xd57\x02\xc2Z\r2\x86PmN\x85O\xf37\x03\xce\xa8u\xca=w\x04B[\x9aq_\xb6u\x9cfZ\xb3\xce0\xb7\xe3\x9b\x18\xee\"$\xbd%!\xf2gd\x04\r\x16!\xbe\xdau\xad\x93\x10\x8a\xd6\xab\xd9\xaf\x16_\xf40\xce\"\xbd5\x80\xdd2', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000008f40)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f80), &(0x7f0000008fc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009000)={@initdev, @empty}, &(0x7f0000009040)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009440)={&(0x7f0000000040), 0xc, &(0x7f0000009400)={&(0x7f0000009080)={0x210, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x210}, 0x1, 0x0, 0x0, 0x8091}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x200020, 0x0) 14:42:51 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6100, 0x0) 14:42:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00') 14:42:52 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6100, 0x0) 14:42:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:52 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6100, 0x0) 14:42:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:52 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) 14:42:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:53 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2]}, 0x5c) 14:42:53 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:54 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:42:55 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:42:55 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:55 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:42:55 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:55 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:55 executing program 1: statx(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:42:56 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:56 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:56 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:56 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x0, 0x7}, 0x0) r1 = gettid() sched_setaffinity(r1, 0x14f9, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000a00)='system_u:object_r:auditctl\xfa\xff\xff\xff\xff\xff\xff\xffs0\x00\xc7\xe4\')\xc3\r\xa7\xb8((pTt\x87\x9c1\x1b&\xc4U\xef\xc3\x7f\xde@\xbb\x04\x9d\xdc\xef\x81\xfb\x9bM\x12s\xf4\x06\xbd^\xff\xa9i(\x98s!\xff\xf2\xa4eO\x93\xccs\xc9c\x1e\xa6\xc3s\xba\x1a;\xa4\xe0\xd8\x80yS\xc6\ah~\xe8Z\xddt\x81\xbb\x98\x03\xe1\xb0\xeb\xff\xf0\xb3\x13mua&\x05\x10(\x9a\xedT~\xd7\xd7\x99v\xe2\xc1r\x9e|GP\xf3#^\x86\xeb3w\x11\xdfh\x01\xd7\xba\xa1K\xe2a\r\x14\xee\r\x12\xdeT\xf2\xc9\xd3\xdd\x0e\xb6@\x18\xe8\x96j\xfa\x83j:\xfb\x839\xf9G\xfd\xa2\xb6\xa6\xdb\x88\xe4\xa7\xbb\x8ak^\x1c\xff\tf=\xc5\x1e\xbe\xc6\xf6\xa9h}\x1d', 0xda, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000001c0)={0x8000000000000fe, &(0x7f0000000b80)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:42:56 executing program 5: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:57 executing program 3: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 5: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 3: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 5: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:57 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:58 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:58 executing program 3: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:58 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000812e400300000000002706000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:42:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:42:58 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) [ 147.480774][ T7] device bridge_slave_1 left promiscuous mode [ 147.487051][ T7] bridge0: port 2(bridge_slave_1) entered disabled state 14:42:58 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0xfffffffffffffe3d) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x681) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x356, 0x0, 0x0, 0x2c4) 14:42:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:42:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000812e400300000000002706000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 147.659034][ T7] device bridge_slave_0 left promiscuous mode [ 147.679467][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 14:42:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:42:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:42:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:42:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000812e400300000000002706000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:42:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:43:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:43:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:43:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000812e400300000000002706000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:43:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:43:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000001031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) 14:43:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 14:43:00 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000040)=[&(0x7f0000009000/0x1000)=nil, &(0x7f0000000000/0x12000)=nil], &(0x7f0000000080)=[0x10000000000001, 0x100000001], 0x0, 0x0) 14:43:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:43:01 executing program 1: migrate_pages(0x0, 0x7, 0x0, &(0x7f00000001c0)=0x2) 14:43:01 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000040)=[&(0x7f0000009000/0x1000)=nil, &(0x7f0000000000/0x12000)=nil], &(0x7f0000000080)=[0x10000000000001, 0x100000001], 0x0, 0x0) 14:43:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 14:43:01 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000680)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}, {@iocharset={'iocharset', 0x3d, 'cp1250'}}], [{@dont_measure='dont_measure'}]}) 14:43:01 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000040)=[&(0x7f0000009000/0x1000)=nil, &(0x7f0000000000/0x12000)=nil], &(0x7f0000000080)=[0x10000000000001, 0x100000001], 0x0, 0x0) 14:43:01 executing program 1: migrate_pages(0x0, 0x7, 0x0, &(0x7f00000001c0)=0x2) 14:43:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000680)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}, {@iocharset={'iocharset', 0x3d, 'cp1250'}}], [{@dont_measure='dont_measure'}]}) 14:43:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 14:43:01 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:02 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000040)=[&(0x7f0000009000/0x1000)=nil, &(0x7f0000000000/0x12000)=nil], &(0x7f0000000080)=[0x10000000000001, 0x100000001], 0x0, 0x0) 14:43:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 14:43:03 executing program 1: migrate_pages(0x0, 0x7, 0x0, &(0x7f00000001c0)=0x2) 14:43:03 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000680)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}, {@iocharset={'iocharset', 0x3d, 'cp1250'}}], [{@dont_measure='dont_measure'}]}) 14:43:03 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 1: migrate_pages(0x0, 0x7, 0x0, &(0x7f00000001c0)=0x2) 14:43:03 executing program 4: futex(0x0, 0x800000000007, 0x0, 0x0, 0x0, 0x0) 14:43:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000680)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}, {@iocharset={'iocharset', 0x3d, 'cp1250'}}], [{@dont_measure='dont_measure'}]}) 14:43:03 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 0: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 14:43:03 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:03 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0x11, 0x3, 0x2) 14:43:03 executing program 4: futex(0x0, 0x800000000007, 0x0, 0x0, 0x0, 0x0) 14:43:03 executing program 0: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 14:43:03 executing program 3: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 14:43:03 executing program 0: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 14:43:03 executing program 4: futex(0x0, 0x800000000007, 0x0, 0x0, 0x0, 0x0) [ 152.760335][T10122] encrypted_key: insufficient parameters specified 14:43:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nobarrier='nobarrier'}]}) 14:43:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) 14:43:04 executing program 3: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 14:43:04 executing program 0: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) [ 153.030438][T10137] gfs2: not a GFS2 filesystem 14:43:04 executing program 3: timer_create(0xb, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 14:43:04 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:04 executing program 4: futex(0x0, 0x800000000007, 0x0, 0x0, 0x0, 0x0) 14:43:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) [ 153.182449][T10137] gfs2: not a GFS2 filesystem 14:43:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) 14:43:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nobarrier='nobarrier'}]}) 14:43:04 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 153.314125][T10153] encrypted_key: insufficient parameters specified 14:43:04 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:04 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) [ 153.529016][T10168] gfs2: not a GFS2 filesystem 14:43:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) [ 153.583815][T10177] encrypted_key: insufficient parameters specified [ 153.606606][T10178] encrypted_key: insufficient parameters specified 14:43:04 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 153.677144][T10179] encrypted_key: insufficient parameters specified 14:43:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nobarrier='nobarrier'}]}) 14:43:04 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) 14:43:04 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) [ 153.900205][T10196] gfs2: not a GFS2 filesystem [ 153.909971][T10198] encrypted_key: insufficient parameters specified [ 153.940332][T10194] encrypted_key: insufficient parameters specified 14:43:05 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 154.045390][T10204] encrypted_key: insufficient parameters specified 14:43:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nobarrier='nobarrier'}]}) 14:43:05 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:05 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) 14:43:05 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 154.232660][T10213] encrypted_key: insufficient parameters specified 14:43:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) [ 154.280905][T10219] gfs2: not a GFS2 filesystem [ 154.318970][T10214] encrypted_key: insufficient parameters specified 14:43:05 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) [ 154.427008][T10227] encrypted_key: insufficient parameters specified 14:43:05 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 154.606496][T10228] FAT-fs (loop3): Directory bread(block 64) failed 14:43:05 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) 14:43:05 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 14:43:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 154.663298][T10237] encrypted_key: insufficient parameters specified [ 154.679902][T10228] FAT-fs (loop3): Directory bread(block 65) failed 14:43:05 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) [ 154.729612][T10228] FAT-fs (loop3): Directory bread(block 66) failed [ 154.748682][T10228] FAT-fs (loop3): Directory bread(block 67) failed [ 154.792106][T10228] FAT-fs (loop3): Directory bread(block 68) failed 14:43:05 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 14:43:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 154.842701][T10228] FAT-fs (loop3): Directory bread(block 69) failed [ 154.879565][T10228] FAT-fs (loop3): Directory bread(block 70) failed 14:43:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) 14:43:06 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) 14:43:06 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 154.964364][T10228] FAT-fs (loop3): Directory bread(block 71) failed [ 154.997515][T10255] encrypted_key: insufficient parameters specified [ 155.064203][T10228] FAT-fs (loop3): Directory bread(block 72) failed [ 155.134973][T10228] FAT-fs (loop3): Directory bread(block 73) failed 14:43:06 executing program 1: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:43:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300), 0x24, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_default\x00', 0x0, 0x0) 14:43:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000008000000bf000000000000009500000000000000b5568017d123252eb20817bbf02c0ea2930000d05c4c4768ccb468a7facd9e5012611b77a321a8f4801bfe320c571f6df2a5a6dc5437543a735ad10ae75bd3445d752bbf99aa187f05cf4810bb938e96708010319949bd2f8de330f24319c5fd1257a0f4feeb33e44d65fde3"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 14:43:06 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 14:43:06 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:43:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001cd400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:43:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000008000000bf000000000000009500000000000000b5568017d123252eb20817bbf02c0ea2930000d05c4c4768ccb468a7facd9e5012611b77a321a8f4801bfe320c571f6df2a5a6dc5437543a735ad10ae75bd3445d752bbf99aa187f05cf4810bb938e96708010319949bd2f8de330f24319c5fd1257a0f4feeb33e44d65fde3"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 14:43:06 executing program 1: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:06 executing program 5: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:06 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 14:43:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000008000000bf000000000000009500000000000000b5568017d123252eb20817bbf02c0ea2930000d05c4c4768ccb468a7facd9e5012611b77a321a8f4801bfe320c571f6df2a5a6dc5437543a735ad10ae75bd3445d752bbf99aa187f05cf4810bb938e96708010319949bd2f8de330f24319c5fd1257a0f4feeb33e44d65fde3"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 14:43:06 executing program 0: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:06 executing program 5: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) [ 155.928166][T10289] FAT-fs (loop3): Directory bread(block 64) failed [ 155.968965][T10289] FAT-fs (loop3): Directory bread(block 65) failed 14:43:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000008000000bf000000000000009500000000000000b5568017d123252eb20817bbf02c0ea2930000d05c4c4768ccb468a7facd9e5012611b77a321a8f4801bfe320c571f6df2a5a6dc5437543a735ad10ae75bd3445d752bbf99aa187f05cf4810bb938e96708010319949bd2f8de330f24319c5fd1257a0f4feeb33e44d65fde3"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 156.009160][T10289] FAT-fs (loop3): Directory bread(block 66) failed [ 156.037138][T10289] FAT-fs (loop3): Directory bread(block 67) failed 14:43:07 executing program 1: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) [ 156.080032][T10289] FAT-fs (loop3): Directory bread(block 68) failed [ 156.087817][T10289] FAT-fs (loop3): Directory bread(block 69) failed 14:43:07 executing program 5: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) [ 156.159658][T10289] FAT-fs (loop3): Directory bread(block 70) failed [ 156.199645][T10289] FAT-fs (loop3): Directory bread(block 71) failed [ 156.270553][T10289] FAT-fs (loop3): Directory bread(block 72) failed [ 156.343337][T10289] FAT-fs (loop3): Directory bread(block 73) failed 14:43:07 executing program 4: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:07 executing program 0: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:07 executing program 2: getcwd(&(0x7f0000001400)=""/4096, 0x1000) 14:43:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:43:07 executing program 1: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:07 executing program 2: getcwd(&(0x7f0000001400)=""/4096, 0x1000) 14:43:07 executing program 4: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:07 executing program 0: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) mlock(&(0x7f000047f000/0x1000)=nil, 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400032, 0xffffffffffffffff, 0x0) 14:43:07 executing program 2: getcwd(&(0x7f0000001400)=""/4096, 0x1000) 14:43:07 executing program 1: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:07 executing program 4: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 156.931103][T10352] FAT-fs (loop3): Directory bread(block 64) failed [ 156.968240][T10352] FAT-fs (loop3): Directory bread(block 65) failed 14:43:08 executing program 1: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) [ 157.014639][T10352] FAT-fs (loop3): Directory bread(block 66) failed [ 157.039580][T10352] FAT-fs (loop3): Directory bread(block 67) failed 14:43:08 executing program 2: getcwd(&(0x7f0000001400)=""/4096, 0x1000) [ 157.089833][T10352] FAT-fs (loop3): Directory bread(block 68) failed [ 157.167877][T10352] FAT-fs (loop3): Directory bread(block 69) failed [ 157.226227][T10352] FAT-fs (loop3): Directory bread(block 70) failed [ 157.280109][T10352] FAT-fs (loop3): Directory bread(block 71) failed [ 157.364521][T10352] FAT-fs (loop3): Directory bread(block 72) failed [ 157.404703][T10352] FAT-fs (loop3): Directory bread(block 73) failed 14:43:08 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200201) socket$netlink(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) 14:43:08 executing program 4: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:08 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:08 executing program 1: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 157.572599][ T7] device hsr_slave_1 left promiscuous mode 14:43:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 157.618350][ T7] device hsr_slave_0 left promiscuous mode [ 157.725145][ T7] team0 (unregistering): Port device team_slave_1 removed 14:43:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:08 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 157.823574][ T7] team0 (unregistering): Port device team_slave_0 removed [ 157.877798][T10404] FAT-fs (loop3): Directory bread(block 64) failed [ 157.892542][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 157.909100][T10404] FAT-fs (loop3): Directory bread(block 65) failed [ 157.926047][T10404] FAT-fs (loop3): Directory bread(block 66) failed [ 157.933603][T10404] FAT-fs (loop3): Directory bread(block 67) failed 14:43:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 157.985741][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 157.999536][T10404] FAT-fs (loop3): Directory bread(block 68) failed [ 158.039607][T10404] FAT-fs (loop3): Directory bread(block 69) failed [ 158.059665][T10404] FAT-fs (loop3): Directory bread(block 70) failed 14:43:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 158.141954][T10404] FAT-fs (loop3): Directory bread(block 71) failed [ 158.188580][T10404] FAT-fs (loop3): Directory bread(block 72) failed [ 158.220126][T10404] FAT-fs (loop3): Directory bread(block 73) failed [ 158.295324][ T7] bond0 (unregistering): Released all slaves 14:43:09 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:09 executing program 5: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:10 executing program 5: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:10 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 5: syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x2a}, &(0x7f0000000200), 0x0) 14:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:10 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0xfffffffffffffff7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 14:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:11 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='attr/fscreate\x00') ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f00000000c0)=0x7, 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000200), &(0x7f0000000240)=0x4) unshare(0x40000000) 14:43:11 executing program 2: io_uring_setup(0x8a8, &(0x7f00000013c0)={0x0, 0x0, 0x7}) 14:43:11 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, 0x0) 14:43:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) [ 160.209538][ C0] sched: DL replenish lagged too much [ 160.258157][T10539] IPVS: ftp: loaded support on port[0] = 21 14:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) 14:43:11 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:43:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 160.508199][T10554] IPVS: ftp: loaded support on port[0] = 21 14:43:11 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='attr/fscreate\x00') ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f00000000c0)=0x7, 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000200), &(0x7f0000000240)=0x4) unshare(0x40000000) [ 160.616379][T10557] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 160.640174][T10557] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 160.646570][T10549] EXT4-fs (sda1): re-mounted. Opts: [ 160.679980][T10557] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 160.715024][T10557] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 160.780871][T10564] IPVS: ftp: loaded support on port[0] = 21 14:43:11 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='attr/fscreate\x00') ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f00000000c0)=0x7, 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000200), &(0x7f0000000240)=0x4) unshare(0x40000000) 14:43:11 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:43:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 161.075247][T10568] EXT4-fs (sda1): re-mounted. Opts: [ 161.188899][T10575] IPVS: ftp: loaded support on port[0] = 21 14:43:12 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, 0x0) [ 161.281554][T10576] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 161.309814][T10576] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 161.582469][T10583] EXT4-fs (sda1): re-mounted. Opts: [ 313.499535][ T1046] INFO: task syz-executor.2:10540 blocked for more than 143 seconds. [ 313.507756][ T1046] Not tainted 5.2.0+ #57 [ 313.513087][ T1046] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 313.522323][ T1046] syz-executor.2 D28264 10540 9079 0x00004004 [ 313.529931][ T1046] Call Trace: [ 313.533265][ T1046] __schedule+0x7c5/0x1560 [ 313.537674][ T1046] ? __sched_text_start+0x8/0x8 [ 313.542961][ T1046] ? __lock_acquire+0x537/0x4af0 [ 313.548073][ T1046] schedule+0xa8/0x260 [ 313.552848][ T1046] schedule_timeout+0x717/0xc50 [ 313.557878][ T1046] ? find_held_lock+0x35/0x130 [ 313.563236][ T1046] ? usleep_range+0x170/0x170 [ 313.567915][ T1046] ? lock_downgrade+0x920/0x920 [ 313.573182][ T1046] ? _raw_spin_unlock_irq+0x28/0x90 [ 313.578374][ T1046] ? wait_for_completion+0x294/0x440 [ 313.583773][ T1046] ? _raw_spin_unlock_irq+0x28/0x90 [ 313.589049][ T1046] ? lockdep_hardirqs_on+0x418/0x5d0 [ 313.594588][ T1046] ? trace_hardirqs_on+0x67/0x220 [ 313.600722][ T1046] ? kasan_check_read+0x11/0x20 [ 313.605861][ T1046] wait_for_completion+0x29c/0x440 [ 313.611658][ T1046] ? try_to_wake_up+0xde/0x1a10 [ 313.616615][ T1046] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 313.623781][ T1046] ? wake_up_q+0xf0/0xf0 [ 313.628205][ T1046] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 313.634435][ T1046] kthread_stop+0x10b/0x6c0 [ 313.639834][ T1046] io_finish_async+0x73/0x140 [ 313.645220][ T1046] io_ring_ctx_wait_and_kill+0x133/0x600 [ 313.651386][ T1046] io_uring_release+0x42/0x50 [ 313.656357][ T1046] __fput+0x2ff/0x890 [ 313.660559][ T1046] ? io_ring_ctx_wait_and_kill+0x600/0x600 [ 313.666468][ T1046] ____fput+0x16/0x20 [ 313.670707][ T1046] task_work_run+0x145/0x1c0 [ 313.675613][ T1046] exit_to_usermode_loop+0x309/0x370 [ 313.680979][ T1046] do_syscall_64+0x58e/0x680 [ 313.685791][ T1046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.692047][ T1046] RIP: 0033:0x413501 [ 313.696137][ T1046] Code: 39 0f 87 d1 03 00 00 49 89 f2 45 31 db 45 31 e4 eb 27 4d 8d 6b 08 44 0f b6 36 49 89 cf 4c 89 d9 49 d3 e6 48 83 f9 40 4c 89 f9 <4d> 19 ff 4d 21 f7 4d 09 fc 48 ff c6 4d 89 eb 4d 39 cb 72 d4 4c 89 [ 313.717452][ T1046] RSP: 002b:00007ffdf3e43bf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 313.726345][ T1046] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413501 [ 313.734828][ T1046] RDX: 0000001b33220000 RSI: 0000000000000000 RDI: 0000000000000003 [ 313.743564][ T1046] RBP: 0000000000000001 R08: 000000009eee67c3 R09: 000000009eee67c7 [ 313.752302][ T1046] R10: 00007ffdf3e43cd0 R11: 0000000000000293 R12: 000000000075c9a0 [ 313.760921][ T1046] R13: 000000000075c9a0 R14: 00000000007604b0 R15: ffffffffffffffff [ 313.769532][ T1046] [ 313.769532][ T1046] Showing all locks held in the system: [ 313.777665][ T1046] 1 lock held by khungtaskd/1046: [ 313.783328][ T1046] #0: 000000005e55999b (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 313.793996][ T1046] 1 lock held by rsyslogd/8330: [ 313.799255][ T1046] #0: 00000000a1a853f6 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 313.808323][ T1046] 2 locks held by getty/8420: [ 313.813622][ T1046] #0: 00000000a7acf05f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.823114][ T1046] #1: 000000008ccef11c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.832742][ T1046] 2 locks held by getty/8421: [ 313.838219][ T1046] #0: 000000008c5acf68 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.848166][ T1046] #1: 000000002a9aa270 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.858312][ T1046] 2 locks held by getty/8422: [ 313.863730][ T1046] #0: 00000000afe68b8a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.873263][ T1046] #1: 000000004c1eae2d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.883426][ T1046] 2 locks held by getty/8423: [ 313.888442][ T1046] #0: 0000000055002eb4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.898015][ T1046] #1: 0000000003a56ba6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.907973][ T1046] 2 locks held by getty/8424: [ 313.913017][ T1046] #0: 00000000608ab536 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.922746][ T1046] #1: 0000000029aa264f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.932955][ T1046] 2 locks held by getty/8425: [ 313.938257][ T1046] #0: 000000001a60ac2e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.948057][ T1046] #1: 00000000a13dae2f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.958409][ T1046] 2 locks held by getty/8426: [ 313.963417][ T1046] #0: 0000000048735e62 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 313.973857][ T1046] #1: 000000009e2d501f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 313.983917][ T1046] [ 313.986290][ T1046] ============================================= [ 313.986290][ T1046] [ 313.994847][ T1046] NMI backtrace for cpu 1 [ 313.999249][ T1046] CPU: 1 PID: 1046 Comm: khungtaskd Not tainted 5.2.0+ #57 [ 314.006443][ T1046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.017281][ T1046] Call Trace: [ 314.020647][ T1046] dump_stack+0x172/0x1f0 [ 314.025180][ T1046] nmi_cpu_backtrace.cold+0x63/0xa4 [ 314.030392][ T1046] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 314.036209][ T1046] nmi_trigger_cpumask_backtrace+0x1ca/0x242 [ 314.042330][ T1046] arch_trigger_cpumask_backtrace+0x14/0x20 [ 314.048316][ T1046] watchdog+0x9b7/0xec0 [ 314.052465][ T1046] kthread+0x354/0x420 [ 314.056722][ T1046] ? reset_hung_task_detector+0x30/0x30 [ 314.062628][ T1046] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 314.079894][ T1046] ret_from_fork+0x24/0x30 [ 314.084399][ T1046] Sending NMI from CPU 1 to CPUs 0: [ 314.089732][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 314.090639][ T1046] Kernel panic - not syncing: hung_task: blocked tasks [ 314.105301][ T1046] CPU: 1 PID: 1046 Comm: khungtaskd Not tainted 5.2.0+ #57 [ 314.112765][ T1046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.123200][ T1046] Call Trace: [ 314.126486][ T1046] dump_stack+0x172/0x1f0 [ 314.131187][ T1046] panic+0x2cb/0x744 [ 314.135219][ T1046] ? __warn_printk+0xf3/0xf3 [ 314.140043][ T1046] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 314.146320][ T1046] ? printk_safe_flush+0xf2/0x140 [ 314.151500][ T1046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.158518][ T1046] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 314.164471][ T1046] ? nmi_trigger_cpumask_backtrace+0x1b3/0x242 [ 314.170979][ T1046] ? nmi_trigger_cpumask_backtrace+0x1aa/0x242 [ 314.177423][ T1046] watchdog+0x9c8/0xec0 [ 314.181813][ T1046] kthread+0x354/0x420 [ 314.186230][ T1046] ? reset_hung_task_detector+0x30/0x30 [ 314.191915][ T1046] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 314.198655][ T1046] ret_from_fork+0x24/0x30 [ 314.205440][ T1046] Kernel Offset: disabled [ 314.210326][ T1046] Rebooting in 86400 seconds..