[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x0, 0x0) ioctl(r7, 0x8916, &(0x7f0000000000)) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r8, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:00 executing program 2: 04:45:00 executing program 3: 04:45:00 executing program 0: 04:45:00 executing program 4: 04:45:00 executing program 0: 04:45:00 executing program 3: [ 649.348825][T12587] IPVS: ftp: loaded support on port[0] = 21 [ 649.405917][T12587] chnl_net:caif_netlink_parms(): no params data found [ 649.432164][T12587] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.439563][T12587] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.447623][T12587] device bridge_slave_0 entered promiscuous mode [ 649.455155][T12587] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.462288][T12587] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.469956][T12587] device bridge_slave_1 entered promiscuous mode [ 649.487455][T12587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 649.498514][T12587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 649.516611][T12587] team0: Port device team_slave_0 added [ 649.523208][T12587] team0: Port device team_slave_1 added [ 649.609545][T12587] device hsr_slave_0 entered promiscuous mode [ 649.657277][T12587] device hsr_slave_1 entered promiscuous mode [ 649.696895][T12587] debugfs: Directory 'hsr0' with parent '/' already present! [ 649.710891][T12587] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.718000][T12587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.725763][T12587] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.732872][T12587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.764183][T12587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 649.775394][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 649.783759][ T7905] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.792092][ T7905] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.801626][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 649.814397][T12587] 8021q: adding VLAN 0 to HW filter on device team0 [ 649.825793][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 649.834540][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.841613][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.857837][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 649.866405][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.875330][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.887207][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 649.896084][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 649.910367][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 649.921785][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 649.933854][T12587] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 649.945502][T12587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 649.958256][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 649.975190][T12587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 649.983433][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 649.991361][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 650.989888][T12597] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.997081][T12597] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.017740][ T7936] device bridge_slave_1 left promiscuous mode [ 653.023908][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.087491][ T7936] device bridge_slave_0 left promiscuous mode [ 653.093689][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.197080][ T7936] device hsr_slave_0 left promiscuous mode [ 653.236991][ T7936] device hsr_slave_1 left promiscuous mode [ 653.284093][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 653.294343][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 653.304543][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 653.341439][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 653.420301][ T7936] bond0 (unregistering): Released all slaves 04:45:10 executing program 5: 04:45:10 executing program 2: 04:45:10 executing program 4: 04:45:10 executing program 0: 04:45:10 executing program 3: 04:45:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x0, 0x0) ioctl(r7, 0x8916, &(0x7f0000000000)) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r8, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:10 executing program 2: 04:45:10 executing program 4: 04:45:10 executing program 3: 04:45:10 executing program 0: 04:45:11 executing program 2: 04:45:11 executing program 3: [ 659.360179][T12626] IPVS: ftp: loaded support on port[0] = 21 [ 659.413952][T12626] chnl_net:caif_netlink_parms(): no params data found [ 659.441066][T12626] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.448227][T12626] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.455895][T12626] device bridge_slave_0 entered promiscuous mode [ 659.463433][T12626] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.470692][T12626] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.479867][T12626] device bridge_slave_1 entered promiscuous mode [ 659.496541][T12626] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 659.508186][T12626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 659.526171][T12626] team0: Port device team_slave_0 added [ 659.532893][T12626] team0: Port device team_slave_1 added [ 659.609676][T12626] device hsr_slave_0 entered promiscuous mode [ 659.677176][T12626] device hsr_slave_1 entered promiscuous mode [ 659.716978][T12626] debugfs: Directory 'hsr0' with parent '/' already present! [ 659.731906][T12626] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.739231][T12626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.746534][T12626] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.753703][T12626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.784606][T12626] 8021q: adding VLAN 0 to HW filter on device bond0 [ 659.796221][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.804464][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.812485][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.822058][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 659.834433][T12626] 8021q: adding VLAN 0 to HW filter on device team0 [ 659.845797][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.855876][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.862925][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.873874][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.882596][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.889733][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.910020][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 659.918781][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 659.928347][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 659.940043][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.954677][T12626] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 659.966051][T12626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 659.975094][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.990581][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 659.998269][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 660.011132][T12626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 660.974978][T12636] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.982201][T12636] bridge0: port 1(bridge_slave_0) entered disabled state 04:45:15 executing program 5: 04:45:15 executing program 4: 04:45:15 executing program 0: 04:45:15 executing program 2: 04:45:15 executing program 3: 04:45:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x0, 0x0) ioctl(r7, 0x8916, &(0x7f0000000000)) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r8, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:15 executing program 2: 04:45:16 executing program 4: 04:45:16 executing program 0: 04:45:16 executing program 3: 04:45:16 executing program 2: 04:45:16 executing program 3: [ 663.047600][ T64] device bridge_slave_1 left promiscuous mode [ 663.057284][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 663.127569][ T64] device bridge_slave_0 left promiscuous mode [ 663.136069][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.287110][ T64] device hsr_slave_0 left promiscuous mode [ 663.326888][ T64] device hsr_slave_1 left promiscuous mode [ 663.385556][ T64] team0 (unregistering): Port device team_slave_1 removed [ 663.415363][ T64] team0 (unregistering): Port device team_slave_0 removed [ 663.431393][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 663.486179][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 663.580680][ T64] bond0 (unregistering): Released all slaves [ 664.630104][T12661] IPVS: ftp: loaded support on port[0] = 21 [ 664.684312][T12661] chnl_net:caif_netlink_parms(): no params data found [ 664.710212][T12661] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.717713][T12661] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.725644][T12661] device bridge_slave_0 entered promiscuous mode [ 664.733487][T12661] bridge0: port 2(bridge_slave_1) entered blocking state [ 664.740826][T12661] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.748968][T12661] device bridge_slave_1 entered promiscuous mode [ 664.765665][T12661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 664.776444][T12661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 664.795232][T12661] team0: Port device team_slave_0 added [ 664.801972][T12661] team0: Port device team_slave_1 added [ 664.879433][T12661] device hsr_slave_0 entered promiscuous mode [ 664.937322][T12661] device hsr_slave_1 entered promiscuous mode [ 664.996883][T12661] debugfs: Directory 'hsr0' with parent '/' already present! [ 665.036342][T12661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 665.049681][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 665.059862][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 665.067902][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.078529][T12661] 8021q: adding VLAN 0 to HW filter on device team0 [ 665.088502][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 665.098412][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.107056][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.114084][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.122332][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 665.132266][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 665.141163][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.149597][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.156724][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.175443][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 665.184634][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 665.196330][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 665.209284][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 665.220647][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 665.231420][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 665.245398][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 665.252904][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 665.263762][T12661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 666.177429][T12671] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.184607][T12671] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.237624][ T7921] device bridge_slave_1 left promiscuous mode [ 668.243821][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.307494][ T7921] device bridge_slave_0 left promiscuous mode [ 668.313788][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.397096][ T7921] device hsr_slave_0 left promiscuous mode [ 668.436940][ T7921] device hsr_slave_1 left promiscuous mode [ 668.484415][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 668.494761][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 668.506114][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 668.570402][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 668.629944][ T7921] bond0 (unregistering): Released all slaves 04:45:25 executing program 5: 04:45:25 executing program 4: 04:45:25 executing program 0: 04:45:25 executing program 3: 04:45:25 executing program 2: 04:45:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:25 executing program 0: 04:45:25 executing program 2: 04:45:25 executing program 3: 04:45:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000206050368fe07602b00003f0e430a001400020045b300070300000319001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:45:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 04:45:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) [ 672.183200][T12691] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 672.200956][T12691] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 673.874348][T12706] IPVS: ftp: loaded support on port[0] = 21 [ 673.932660][T12706] chnl_net:caif_netlink_parms(): no params data found [ 673.959600][T12706] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.967039][T12706] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.974794][T12706] device bridge_slave_0 entered promiscuous mode [ 673.982491][T12706] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.989607][T12706] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.998290][T12706] device bridge_slave_1 entered promiscuous mode [ 674.014850][T12706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 674.025663][T12706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 674.045684][T12706] team0: Port device team_slave_0 added [ 674.052503][T12706] team0: Port device team_slave_1 added [ 674.109582][T12706] device hsr_slave_0 entered promiscuous mode [ 674.147413][T12706] device hsr_slave_1 entered promiscuous mode [ 674.216848][T12706] debugfs: Directory 'hsr0' with parent '/' already present! [ 674.231159][T12706] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.238336][T12706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 674.245631][T12706] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.252782][T12706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 674.283321][T12706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 674.294648][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 674.303116][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.311239][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 674.320565][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 674.332714][T12706] 8021q: adding VLAN 0 to HW filter on device team0 [ 674.344274][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 674.352945][ T2609] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.360013][ T2609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 674.377974][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 674.386603][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.393782][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 674.402614][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 674.414540][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 674.422963][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 674.434841][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 674.448623][T12706] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 674.460501][T12706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 674.468996][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 674.487687][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 674.495289][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 674.505314][T12706] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 675.460674][T12716] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.468231][T12716] bridge0: port 1(bridge_slave_0) entered disabled state 04:45:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720", 0xc6, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/245, 0xf5}], 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/245, 0xf5}], 0x1) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) recvmmsg(r1, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) readv(r3, &(0x7f0000000140)=[{0x0}], 0x1) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x7ff8, 0x4000002, 0x0, 0x27) 04:45:29 executing program 2: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) 04:45:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="fa", 0x1, 0x0, 0x0, 0x0) 04:45:29 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendmmsg(r0, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20050004) 04:45:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) fcntl$getflags(r4, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) bind$packet(r2, &(0x7f0000000300), 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c"], 0x1}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r5 = socket(0xa, 0x1, 0x0) ioctl(r5, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 04:45:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 04:45:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="240000004a005f0014f9f407000909000a0080014e000000000000000800020000000000", 0x24) [ 678.160674][T12745] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.167979][T12745] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.927789][ T7921] device bridge_slave_1 left promiscuous mode [ 679.934025][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.987602][ T7921] device bridge_slave_0 left promiscuous mode [ 679.993817][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.107742][ T7921] device hsr_slave_0 left promiscuous mode [ 680.176835][ T7921] device hsr_slave_1 left promiscuous mode [ 680.224623][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 680.235493][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 680.245576][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 680.301386][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 680.397805][ T7921] bond0 (unregistering): Released all slaves 04:45:36 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x24, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_XDP={0x4}]}, 0x24}}, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x1, 0x0) ioctl(r7, 0x80000000008936, &(0x7f0000000000)) sendmsg$NET_DM_CMD_STOP(r7, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) socket$inet6_tcp(0xa, 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) 04:45:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 04:45:36 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400077c1b9a0650ff2a600040000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008000500000000000800050000000000380001005304000000000000000000000000000000000000001200"/86], 0x7c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4886d2b772f3e62, 0x0) 04:45:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) clone(0x13102000ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r0, 0x400, 0x1) socket(0x0, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 04:45:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/245, 0xf5}], 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/245, 0xf5}], 0x1) recvmmsg(r2, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) recvmmsg(r1, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 04:45:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:37 executing program 3: pipe(&(0x7f0000000080)) close(0xffffffffffffffff) pipe(&(0x7f0000000080)) close(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000080)) close(0xffffffffffffffff) pipe(&(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:45:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) [ 685.370308][T12804] IPVS: ftp: loaded support on port[0] = 21 [ 685.424166][T12804] chnl_net:caif_netlink_parms(): no params data found [ 685.450867][T12804] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.459175][T12804] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.467080][T12804] device bridge_slave_0 entered promiscuous mode [ 685.474520][T12804] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.481865][T12804] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.489806][T12804] device bridge_slave_1 entered promiscuous mode [ 685.507660][T12804] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 685.518361][T12804] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 685.537332][T12804] team0: Port device team_slave_0 added [ 685.543779][T12804] team0: Port device team_slave_1 added [ 685.619484][T12804] device hsr_slave_0 entered promiscuous mode [ 685.657341][T12804] device hsr_slave_1 entered promiscuous mode [ 685.726904][T12804] debugfs: Directory 'hsr0' with parent '/' already present! [ 685.741102][T12804] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.748229][T12804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.755478][T12804] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.762580][T12804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.798729][T12804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 685.811743][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 685.820733][ T2609] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.829389][ T2609] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.847759][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 685.860186][T12804] 8021q: adding VLAN 0 to HW filter on device team0 [ 685.871722][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.880945][ T2609] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.888069][ T2609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.902765][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 685.911270][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.918361][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.931605][T12807] IPVS: ftp: loaded support on port[0] = 21 [ 685.939547][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 685.948825][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 685.968723][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 685.980859][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 685.989279][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 686.006253][T12804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 686.037039][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 686.044448][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 686.057805][T12804] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 686.100088][T12807] chnl_net:caif_netlink_parms(): no params data found [ 686.130188][T12807] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.137510][T12807] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.145496][T12807] device bridge_slave_0 entered promiscuous mode [ 686.154801][T12807] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.162692][T12807] bridge0: port 2(bridge_slave_1) entered disabled state [ 686.173104][T12807] device bridge_slave_1 entered promiscuous mode [ 686.211032][T12807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 686.222219][T12807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 686.242838][T12807] team0: Port device team_slave_0 added [ 686.249502][T12807] team0: Port device team_slave_1 added [ 686.268410][T12815] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. [ 686.309572][T12807] device hsr_slave_0 entered promiscuous mode [ 686.337310][T12807] device hsr_slave_1 entered promiscuous mode [ 686.397319][T12807] debugfs: Directory 'hsr0' with parent '/' already present! [ 686.412513][T12807] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.419574][T12807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 686.426985][T12807] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.434010][T12807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 686.443509][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.451460][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 686.488769][T12807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 686.501264][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 686.509920][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 686.527188][T12807] 8021q: adding VLAN 0 to HW filter on device team0 [ 686.537780][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 686.553213][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 686.562219][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.569427][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 686.587096][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 686.595846][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 686.605143][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.612279][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 686.620823][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 686.629862][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 686.639158][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 686.647976][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 686.657329][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 686.667448][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 686.682124][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 686.695517][T12807] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 686.706396][T12807] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 686.718932][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 686.727793][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 686.736132][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 686.744598][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 686.753275][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 686.770757][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 686.778295][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 686.788270][T12807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 687.718026][T12840] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.725180][T12840] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.757793][ T64] device bridge_slave_1 left promiscuous mode [ 689.764169][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 689.807357][ T64] device bridge_slave_0 left promiscuous mode [ 689.813743][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.917052][ T64] device hsr_slave_0 left promiscuous mode [ 689.966947][ T64] device hsr_slave_1 left promiscuous mode [ 690.014691][ T64] team0 (unregistering): Port device team_slave_1 removed [ 690.025914][ T64] team0 (unregistering): Port device team_slave_0 removed [ 690.037270][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 690.081695][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 690.159823][ T64] bond0 (unregistering): Released all slaves 04:45:46 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB='#! ./file0'], 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:45:46 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:46 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 04:45:46 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) fchdir(r0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0x15, 0x0, 0x9, "f8843d7c5dcd4dc5360e213a24bbc1254fcb72cea0"}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 04:45:46 executing program 2: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x2, 0x0, &(0x7f0000000140)) 04:45:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:46 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:46 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB='#! ./fi'], 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:45:46 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) fchdir(r0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0x15, 0x0, 0x9, "f8843d7c5dcd4dc5360e213a24bbc1254fcb72cea0"}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 04:45:46 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x2, 0x0, &(0x7f0000000140)) 04:45:47 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) [ 695.363169][T12893] IPVS: ftp: loaded support on port[0] = 21 [ 695.419521][T12893] chnl_net:caif_netlink_parms(): no params data found [ 695.445796][T12893] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.453093][T12893] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.460953][T12893] device bridge_slave_0 entered promiscuous mode [ 695.468911][T12893] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.476109][T12893] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.483965][T12893] device bridge_slave_1 entered promiscuous mode [ 695.500591][T12893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 695.511519][T12893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 695.530558][T12893] team0: Port device team_slave_0 added [ 695.537161][T12893] team0: Port device team_slave_1 added [ 695.589487][T12893] device hsr_slave_0 entered promiscuous mode [ 695.627184][T12893] device hsr_slave_1 entered promiscuous mode [ 695.666927][T12893] debugfs: Directory 'hsr0' with parent '/' already present! [ 695.681750][T12893] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.688890][T12893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.696129][T12893] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.703269][T12893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.734060][T12893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 695.746123][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 695.754717][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.763107][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.772142][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 695.784637][T12893] 8021q: adding VLAN 0 to HW filter on device team0 [ 695.795416][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 695.804253][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.811512][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.822158][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 695.830763][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.837884][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.855762][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 695.864779][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 695.876234][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 695.889466][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 695.901141][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 695.911563][T12893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 695.925608][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 695.933482][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 695.944037][T12893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 696.925245][T12903] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.932559][T12903] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.987686][ T64] device bridge_slave_1 left promiscuous mode [ 698.994034][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.027642][ T64] device bridge_slave_0 left promiscuous mode [ 699.033840][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.127025][ T64] device hsr_slave_0 left promiscuous mode [ 699.186921][ T64] device hsr_slave_1 left promiscuous mode [ 699.244649][ T64] team0 (unregistering): Port device team_slave_1 removed [ 699.255037][ T64] team0 (unregistering): Port device team_slave_0 removed [ 699.265134][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 699.321377][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 699.419282][ T64] bond0 (unregistering): Released all slaves 04:45:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:57 executing program 5: clone(0x20002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup2(r2, r3) ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) 04:45:57 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) fchdir(r0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0x15, 0x0, 0x9, "f8843d7c5dcd4dc5360e213a24bbc1254fcb72cea0"}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 04:45:57 executing program 2: r0 = gettid() semget$private(0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) exit(0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) prlimit64(0x0, 0xd, 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) tkill(r0, 0x1000000000016) 04:45:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf0554edc7de8ddeb133c2b3ce9fad90f15a36a15", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x42, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x678, 0x5, 0x3, 0x5c4b}, 0x14) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) getpid() 04:45:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:45:57 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:45:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:57 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 04:45:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:45:58 executing program 4: clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x103ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0x2100001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = memfd_create(&(0x7f0000000140)='\'\x00', 0x3) write(r2, &(0x7f0000000380)="c2", 0x1) sendfile(r1, r2, &(0x7f0000000240), 0x9) fcntl$addseals(r2, 0x409, 0x8) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file1\x00') pivot_root(&(0x7f0000000080)='./file2\x00', 0x0) [ 706.666189][T12972] IPVS: ftp: loaded support on port[0] = 21 [ 706.722397][T12972] chnl_net:caif_netlink_parms(): no params data found [ 706.750662][T12972] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.757882][T12972] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.765518][T12972] device bridge_slave_0 entered promiscuous mode [ 706.773389][T12972] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.780508][T12972] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.788363][T12972] device bridge_slave_1 entered promiscuous mode [ 706.805193][T12972] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 706.816016][T12972] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 706.835294][T12972] team0: Port device team_slave_0 added [ 706.841851][T12972] team0: Port device team_slave_1 added [ 706.919547][T12972] device hsr_slave_0 entered promiscuous mode [ 706.977285][T12972] device hsr_slave_1 entered promiscuous mode [ 707.016954][T12972] debugfs: Directory 'hsr0' with parent '/' already present! [ 707.030606][T12972] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.037907][T12972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.045523][T12972] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.052993][T12972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.083747][T12972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 707.095144][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.103644][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.111875][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.121681][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 707.133860][T12972] 8021q: adding VLAN 0 to HW filter on device team0 [ 707.145144][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 707.153698][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.160733][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.172215][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 707.180695][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.187769][ T2609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.205575][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 707.214585][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 707.226572][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 707.239574][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 707.251072][T12972] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 707.263013][T12972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 707.270982][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 707.287229][T12972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 707.295078][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 707.303312][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 708.807328][T12980] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.814644][T12980] bridge0: port 1(bridge_slave_0) entered disabled state 04:46:09 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:46:09 executing program 2: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 04:46:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:09 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:46:09 executing program 4: clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x103ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0x2100001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = memfd_create(&(0x7f0000000140)='\'\x00', 0x3) write(r2, &(0x7f0000000380)="c2", 0x1) sendfile(r1, r2, &(0x7f0000000240), 0x9) fcntl$addseals(r2, 0x409, 0x8) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file1\x00') pivot_root(&(0x7f0000000080)='./file2\x00', 0x0) 04:46:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 715.796928][T13007] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 04:46:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:09 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1600, 0x4004400}) 04:46:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r7, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:46:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) bind$packet(r2, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 717.677255][ T7921] device bridge_slave_1 left promiscuous mode [ 717.683624][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.727410][ T7921] device bridge_slave_0 left promiscuous mode [ 717.733617][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.817227][ T7921] device hsr_slave_0 left promiscuous mode [ 717.876998][ T7921] device hsr_slave_1 left promiscuous mode [ 717.924382][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 717.934732][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 717.946657][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 718.001523][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 718.068328][ T7921] bond0 (unregistering): Released all slaves 04:46:18 executing program 5: sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ptrace$getsig(0x4202, 0x0, 0x2, &(0x7f0000000180)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:46:18 executing program 4: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) ioctl$TCSETS(r2, 0x5405, &(0x7f0000000080)={0x0, 0x3}) 04:46:18 executing program 2: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="b40800002c000107f1ff58980000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x8b4}}, 0x0) 04:46:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) bind$packet(r2, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:46:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:46:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:18 executing program 2: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="b40800002c000107f1ff58980000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x8b4}}, 0x0) 04:46:18 executing program 4: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) ioctl$TCSETS(r2, 0x5405, &(0x7f0000000080)={0x0, 0x3}) 04:46:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:19 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) ioctl$TCSETS(r2, 0x5405, &(0x7f0000000080)={0x0, 0x3}) 04:46:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:19 executing program 4: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) ioctl$TCSETS(r2, 0x5405, &(0x7f0000000080)={0x0, 0x3}) [ 727.431319][T13103] IPVS: ftp: loaded support on port[0] = 21 [ 727.482225][T13103] chnl_net:caif_netlink_parms(): no params data found [ 727.509996][T13103] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.517312][T13103] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.525055][T13103] device bridge_slave_0 entered promiscuous mode [ 727.532578][T13103] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.541235][T13103] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.549339][T13103] device bridge_slave_1 entered promiscuous mode [ 727.565348][T13103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 727.576254][T13103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 727.597352][T13103] team0: Port device team_slave_0 added [ 727.604020][T13103] team0: Port device team_slave_1 added [ 727.659269][T13103] device hsr_slave_0 entered promiscuous mode [ 727.707387][T13103] device hsr_slave_1 entered promiscuous mode [ 727.766884][T13103] debugfs: Directory 'hsr0' with parent '/' already present! [ 727.781649][T13103] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.788781][T13103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 727.796069][T13103] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.803162][T13103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 727.834178][T13103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 727.845558][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 727.854272][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.862163][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.871194][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 727.883010][T13103] 8021q: adding VLAN 0 to HW filter on device team0 [ 727.894651][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 727.903239][ T2609] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.910420][ T2609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 727.921199][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 727.929715][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.936742][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 727.960814][T13103] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 727.972100][T13103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 727.984915][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 727.994152][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 728.002968][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 728.011324][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 728.019874][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 728.027846][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 728.045840][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 728.053684][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 728.064723][T13103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 730.087550][ T7921] device bridge_slave_1 left promiscuous mode [ 730.096659][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.147760][ T7921] device bridge_slave_0 left promiscuous mode [ 730.154001][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.897136][ T7921] device hsr_slave_0 left promiscuous mode [ 730.956960][ T7921] device hsr_slave_1 left promiscuous mode [ 731.013207][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 731.024803][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 731.034872][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 731.070331][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 731.160544][ T7921] bond0 (unregistering): Released all slaves [ 731.362851][T13117] fuse: Bad value for 'fd' [ 732.116652][T13118] fuse: Bad value for 'fd' [ 732.116689][T13117] fuse: Bad value for 'fd' 04:46:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) syz_open_pts(r2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) creat(0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:46:25 executing program 0: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:25 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:46:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002, 0x0, @rand_addr, 0xff}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00'}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, @dev, 0x4}}}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 04:46:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 04:46:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) bind$packet(r2, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="03c0e35a39d1b978706a3449f303d2356d6aac55002bf8d700c3c74a2194b32f4c74066e62f69d8eb2aa7ef2f0517f468cd57ae2dec6e937134fd2072f757004b5a72142e9fda0a6f404530ec94c99c0b7a5d69acf0583a0a8258749e5e5343e"], 0x1}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:46:25 executing program 0: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 04:46:25 executing program 0: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) 04:46:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 04:46:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 04:46:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 734.604059][T13167] IPVS: ftp: loaded support on port[0] = 21 [ 734.658528][T13167] chnl_net:caif_netlink_parms(): no params data found [ 734.685696][T13167] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.694033][T13167] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.702150][T13167] device bridge_slave_0 entered promiscuous mode [ 734.710180][T13167] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.717812][T13167] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.725556][T13167] device bridge_slave_1 entered promiscuous mode [ 734.744165][T13167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 734.755238][T13167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 734.775712][T13167] team0: Port device team_slave_0 added [ 734.783107][T13167] team0: Port device team_slave_1 added [ 734.839267][T13167] device hsr_slave_0 entered promiscuous mode [ 734.897317][T13167] device hsr_slave_1 entered promiscuous mode [ 734.946922][T13167] debugfs: Directory 'hsr0' with parent '/' already present! [ 734.962236][T13167] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.969444][T13167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.981830][T13167] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.992273][T13167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 735.023254][T13167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 735.034614][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 735.043328][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.051641][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.061171][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 735.073018][T13167] 8021q: adding VLAN 0 to HW filter on device team0 [ 735.084815][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 735.093824][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 735.101465][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 735.112952][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 735.121789][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 735.128876][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 735.148047][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 735.157951][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 735.173562][T13167] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 735.184979][T13167] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 735.198707][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 735.208200][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 735.217031][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 735.225724][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 735.240725][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 735.249118][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 735.260445][T13167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 737.247510][ T7872] device bridge_slave_1 left promiscuous mode [ 737.253746][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.317576][ T7872] device bridge_slave_0 left promiscuous mode [ 737.324005][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.049968][ T7872] device hsr_slave_0 left promiscuous mode [ 738.117076][ T7872] device hsr_slave_1 left promiscuous mode [ 738.193449][ T7872] team0 (unregistering): Port device team_slave_1 removed [ 738.203743][ T7872] team0 (unregistering): Port device team_slave_0 removed [ 738.214204][ T7872] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 738.271633][ T7872] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 738.349200][ T7872] bond0 (unregistering): Released all slaves 04:46:34 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$key(0xf, 0x3, 0x2) r0 = gettid() ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f66696c6530204047504c1aca656375726974792e65766d00"], 0x1d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2, 0x14, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:46:34 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000280)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000280)={@dev}, 0x14) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000280)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000280)={@dev}, 0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000280)={@remote}, 0x14) 04:46:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syslog(0x2, &(0x7f0000000100)=""/19, 0x13) 04:46:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 04:46:34 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) 04:46:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) bind$packet(r2, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:46:34 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getresgid(&(0x7f0000000180), 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) openat$null(0xffffffffffffff9c, &(0x7f0000001640)='/dev/null\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001600)={0xffffffffffffffff, 0xb, 0x1, 0x9, &(0x7f00000015c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x40}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$UHID_INPUT(r2, &(0x7f0000000340)={0x8, "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", 0x1000}, 0x1006) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r5, 0x200006) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 04:46:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 04:46:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 04:46:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 04:46:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 04:46:35 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000180)) [ 744.134996][T13222] IPVS: ftp: loaded support on port[0] = 21 [ 744.187876][T13222] chnl_net:caif_netlink_parms(): no params data found [ 744.215485][T13222] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.222875][T13222] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.230794][T13222] device bridge_slave_0 entered promiscuous mode [ 744.238724][T13222] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.247312][T13222] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.255313][T13222] device bridge_slave_1 entered promiscuous mode [ 744.272925][T13222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 744.283643][T13222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 744.303075][T13222] team0: Port device team_slave_0 added [ 744.309878][T13222] team0: Port device team_slave_1 added [ 744.369573][T13222] device hsr_slave_0 entered promiscuous mode [ 744.407295][T13222] device hsr_slave_1 entered promiscuous mode [ 744.476932][T13222] debugfs: Directory 'hsr0' with parent '/' already present! [ 744.491253][T13222] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.498442][T13222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 744.505675][T13222] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.512816][T13222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 744.543056][T13222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 744.555241][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 744.563638][T12733] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.573093][T12733] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.581812][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 744.594025][T13222] 8021q: adding VLAN 0 to HW filter on device team0 [ 744.604492][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 744.616191][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.623452][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 744.634516][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 744.643174][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.650261][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 744.666636][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 744.675738][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 744.686743][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 744.699135][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 744.711940][T13222] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 744.723189][T13222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 744.731473][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 744.746218][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 744.754019][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 744.765305][T13222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 746.767246][ T7921] device bridge_slave_1 left promiscuous mode [ 746.773738][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.837767][ T7921] device bridge_slave_0 left promiscuous mode [ 746.844013][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.567254][ T7921] device hsr_slave_0 left promiscuous mode [ 747.617108][ T7921] device hsr_slave_1 left promiscuous mode [ 747.674422][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 747.684603][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 747.695105][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 747.731882][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 747.829756][ T7921] bond0 (unregistering): Released all slaves 04:46:44 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0044306, &(0x7f0000000180)) 04:46:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 04:46:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x300, 0x0, &(0x7f0000000240)) 04:46:44 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) 04:46:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000040)={r4, 0x0, 0x30}, &(0x7f0000000080)=0x18) 04:46:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) bind$packet(r2, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:46:44 executing program 4: 04:46:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 04:46:44 executing program 2: 04:46:44 executing program 4: 04:46:44 executing program 2: 04:46:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 752.939882][T13272] IPVS: ftp: loaded support on port[0] = 21 [ 753.004572][T13272] chnl_net:caif_netlink_parms(): no params data found [ 753.031462][T13272] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.038891][T13272] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.046846][T13272] device bridge_slave_0 entered promiscuous mode [ 753.054390][T13272] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.061570][T13272] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.069609][T13272] device bridge_slave_1 entered promiscuous mode [ 753.087852][T13272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 753.098440][T13272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 753.118024][T13272] team0: Port device team_slave_0 added [ 753.124709][T13272] team0: Port device team_slave_1 added [ 753.199617][T13272] device hsr_slave_0 entered promiscuous mode [ 753.247212][T13272] device hsr_slave_1 entered promiscuous mode [ 753.316929][T13272] debugfs: Directory 'hsr0' with parent '/' already present! [ 753.331494][T13272] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.338572][T13272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.345922][T13272] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.352971][T13272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 753.383479][T13272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 753.394866][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 753.403218][ T2609] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.411379][ T2609] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.420906][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 753.432682][T13272] 8021q: adding VLAN 0 to HW filter on device team0 [ 753.444245][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 753.452685][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.459800][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 753.485212][T13272] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 753.495948][T13272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 753.510077][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 753.519036][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.526120][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.535221][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 753.543928][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 753.552783][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 753.561420][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 753.570305][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 753.578099][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 753.595080][T13272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 753.602566][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 753.610267][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 755.557460][ T7921] device bridge_slave_1 left promiscuous mode [ 755.563728][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.617689][ T7921] device bridge_slave_0 left promiscuous mode [ 755.623845][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.357055][ T7921] device hsr_slave_0 left promiscuous mode [ 756.416985][ T7921] device hsr_slave_1 left promiscuous mode [ 756.474577][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 756.485077][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 756.495354][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 756.520314][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 756.598821][ T7921] bond0 (unregistering): Released all slaves 04:46:54 executing program 5: 04:46:54 executing program 4: 04:46:54 executing program 2: 04:46:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:46:54 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) 04:46:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:46:54 executing program 4: 04:46:54 executing program 2: 04:46:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:46:54 executing program 4: 04:46:54 executing program 2: 04:46:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) [ 763.412451][T13318] IPVS: ftp: loaded support on port[0] = 21 [ 763.466478][T13318] chnl_net:caif_netlink_parms(): no params data found [ 763.494416][T13318] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.501691][T13318] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.509533][T13318] device bridge_slave_0 entered promiscuous mode [ 763.516996][T13318] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.524240][T13318] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.532322][T13318] device bridge_slave_1 entered promiscuous mode [ 763.549718][T13318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 763.560430][T13318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 763.579021][T13318] team0: Port device team_slave_0 added [ 763.585852][T13318] team0: Port device team_slave_1 added [ 763.639690][T13318] device hsr_slave_0 entered promiscuous mode [ 763.687229][T13318] device hsr_slave_1 entered promiscuous mode [ 763.726922][T13318] debugfs: Directory 'hsr0' with parent '/' already present! [ 763.741861][T13318] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.749172][T13318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 763.756459][T13318] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.763637][T13318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 763.793670][T13318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 763.805257][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 763.814081][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.822280][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.831164][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 763.844087][T13318] 8021q: adding VLAN 0 to HW filter on device team0 [ 763.854962][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 763.863595][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.870652][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 763.888703][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 763.897628][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.904924][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 763.914243][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 763.923736][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 763.934493][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 763.952138][T13318] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 763.963534][T13318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 763.975730][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 763.984330][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 763.992915][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 764.007430][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 764.014889][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 764.025433][T13318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 765.957648][ T64] device bridge_slave_1 left promiscuous mode [ 765.964020][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.017381][ T64] device bridge_slave_0 left promiscuous mode [ 766.023740][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.787190][ T64] device hsr_slave_0 left promiscuous mode [ 766.856965][ T64] device hsr_slave_1 left promiscuous mode [ 766.923539][ T64] team0 (unregistering): Port device team_slave_1 removed [ 766.935037][ T64] team0 (unregistering): Port device team_slave_0 removed [ 766.945429][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 767.021704][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 767.079592][ T64] bond0 (unregistering): Released all slaves 04:47:00 executing program 5: 04:47:00 executing program 2: 04:47:00 executing program 4: 04:47:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:47:00 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:01 executing program 2: 04:47:01 executing program 4: 04:47:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:47:01 executing program 4: 04:47:01 executing program 2: 04:47:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c0000", 0x17}], 0x1}, 0x0) [ 769.888813][T13360] IPVS: ftp: loaded support on port[0] = 21 [ 769.945670][T13360] chnl_net:caif_netlink_parms(): no params data found [ 769.972674][T13360] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.979946][T13360] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.988018][T13360] device bridge_slave_0 entered promiscuous mode [ 769.995626][T13360] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.003983][T13360] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.011898][T13360] device bridge_slave_1 entered promiscuous mode [ 770.029908][T13360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 770.040706][T13360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 770.059194][T13360] team0: Port device team_slave_0 added [ 770.065717][T13360] team0: Port device team_slave_1 added [ 770.139784][T13360] device hsr_slave_0 entered promiscuous mode [ 770.207147][T13360] device hsr_slave_1 entered promiscuous mode [ 770.266925][T13360] debugfs: Directory 'hsr0' with parent '/' already present! [ 770.281566][T13360] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.288633][T13360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.295913][T13360] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.302974][T13360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.332685][T13360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 770.343564][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 770.352237][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.360438][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.370446][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 770.382003][T13360] 8021q: adding VLAN 0 to HW filter on device team0 [ 770.393605][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 770.402072][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.409214][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.432072][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 770.440444][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.447482][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.457183][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 770.466006][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 770.476093][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 770.486291][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 770.497797][T13360] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 770.509396][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 770.521838][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 770.536172][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 770.544046][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 770.555459][T13360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 772.537637][ T28] device bridge_slave_1 left promiscuous mode [ 772.543823][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.597671][ T28] device bridge_slave_0 left promiscuous mode [ 772.603939][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.337224][ T28] device hsr_slave_0 left promiscuous mode [ 773.397049][ T28] device hsr_slave_1 left promiscuous mode [ 773.484180][ T28] team0 (unregistering): Port device team_slave_1 removed [ 773.494390][ T28] team0 (unregistering): Port device team_slave_0 removed [ 773.504782][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 773.550459][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 773.639503][ T28] bond0 (unregistering): Released all slaves 04:47:07 executing program 5: 04:47:07 executing program 4: 04:47:07 executing program 2: 04:47:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c0000", 0x17}], 0x1}, 0x0) 04:47:07 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r4, 0x0, 0x0) keyctl$assume_authority(0x10, r4) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:07 executing program 4: 04:47:07 executing program 2: 04:47:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c0000", 0x17}], 0x1}, 0x0) 04:47:07 executing program 4: 04:47:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_attach_bpf(r1, 0x1, 0x3d, &(0x7f0000000000), 0x4) 04:47:07 executing program 4: syz_emit_ethernet(0xd9, &(0x7f0000000380)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0xa3, 0xffffff3a, 0x0, @mcast1, @loopback, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "00f125", 0x0, 0x0, 0x0, @empty, @local, [], "2bddb73af05d1bbdb956d31bce08e1035cade583377228b8448044d0698e08672c2e6119c5f4ae6a8a3a1d1f7949c6c86c8b88bb02ad0d0abc6d01b2a35f1c76a3e7503404cbcc7555c9009c18059fd9b39cfc5a54d3d3f090124ddc81d63a3da9e7ffcade1c8d5719221801b3686a1bfc44a0"}}}}}}}, 0x0) [ 776.253798][T13407] IPVS: ftp: loaded support on port[0] = 21 [ 776.309194][T13407] chnl_net:caif_netlink_parms(): no params data found [ 776.337443][T13407] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.344517][T13407] bridge0: port 1(bridge_slave_0) entered disabled state [ 776.352622][T13407] device bridge_slave_0 entered promiscuous mode [ 776.360368][T13407] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.367499][T13407] bridge0: port 2(bridge_slave_1) entered disabled state [ 776.375289][T13407] device bridge_slave_1 entered promiscuous mode [ 776.392171][T13407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 776.403053][T13407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 776.422771][T13407] team0: Port device team_slave_0 added [ 776.429580][T13407] team0: Port device team_slave_1 added [ 776.480289][T13407] device hsr_slave_0 entered promiscuous mode [ 776.517277][T13407] device hsr_slave_1 entered promiscuous mode [ 776.566896][T13407] debugfs: Directory 'hsr0' with parent '/' already present! [ 776.581039][T13407] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.588145][T13407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.595598][T13407] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.602923][T13407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.632608][T13407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 776.643446][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 776.652404][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 776.660803][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 776.670291][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 776.682395][T13407] 8021q: adding VLAN 0 to HW filter on device team0 [ 776.693900][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 776.702331][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.709518][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.728003][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 776.737186][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.744204][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.753558][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 776.762516][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 776.773422][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 776.785266][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 776.800421][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 776.810242][T13407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 776.823840][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 776.831460][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 776.842501][T13407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 778.777639][ T7921] device bridge_slave_1 left promiscuous mode [ 778.783934][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.827684][ T7921] device bridge_slave_0 left promiscuous mode [ 778.833882][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state 04:47:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x220b, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1\x00') execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10000010d) r2 = dup2(r0, r1) open$dir(&(0x7f0000000380)='./file0\x00', 0x841, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 04:47:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada", 0x23}], 0x1}, 0x0) 04:47:12 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 04:47:12 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 04:47:12 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r4, 0x0, 0x0) keyctl$assume_authority(0x10, r4) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada", 0x23}], 0x1}, 0x0) 04:47:12 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x10) 04:47:12 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 04:47:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada", 0x23}], 0x1}, 0x0) 04:47:13 executing program 2: r0 = socket$kcm(0xa, 0x8000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f0000000280), 0x4) 04:47:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d8050005", 0x29}], 0x1}, 0x0) [ 780.967156][ T7921] device hsr_slave_0 left promiscuous mode [ 781.017018][ T7921] device hsr_slave_1 left promiscuous mode [ 781.094102][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 781.104186][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 781.114595][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 781.151107][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 781.228865][ T7921] bond0 (unregistering): Released all slaves [ 781.763312][T13470] IPVS: ftp: loaded support on port[0] = 21 [ 781.857016][T13470] chnl_net:caif_netlink_parms(): no params data found [ 781.892630][T13470] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.899959][T13470] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.908239][T13470] device bridge_slave_0 entered promiscuous mode [ 781.915885][T13470] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.923603][T13470] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.932021][T13470] device bridge_slave_1 entered promiscuous mode [ 781.949011][T13470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 781.960145][T13470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 781.978657][T13470] team0: Port device team_slave_0 added [ 781.985174][T13470] team0: Port device team_slave_1 added [ 782.049554][T13470] device hsr_slave_0 entered promiscuous mode [ 782.087206][T13470] device hsr_slave_1 entered promiscuous mode [ 782.126958][T13470] debugfs: Directory 'hsr0' with parent '/' already present! [ 782.141100][T13470] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.148252][T13470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.155530][T13470] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.162766][T13470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.194786][T13470] 8021q: adding VLAN 0 to HW filter on device bond0 [ 782.207607][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 782.215950][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.224174][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.237050][T13470] 8021q: adding VLAN 0 to HW filter on device team0 [ 782.248582][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 782.257511][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.264562][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.289472][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 782.298473][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.305500][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.314574][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 782.324317][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 782.333238][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 782.341500][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 782.350785][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 782.366203][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 782.373900][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 782.384481][T13470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 784.387656][ T7921] device bridge_slave_1 left promiscuous mode [ 784.394071][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.437494][ T7921] device bridge_slave_0 left promiscuous mode [ 784.443759][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 785.187166][ T7921] device hsr_slave_0 left promiscuous mode [ 785.227329][ T7921] device hsr_slave_1 left promiscuous mode [ 785.274172][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 785.284845][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 785.295327][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 785.341453][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 785.410027][ T7921] bond0 (unregistering): Released all slaves 04:47:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x1, &(0x7f0000000500)=@raw=[@call], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:47:19 executing program 2: r0 = socket$kcm(0xa, 0x8000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1d, &(0x7f0000000280), 0x4) 04:47:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d8050005", 0x29}], 0x1}, 0x0) 04:47:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f00000001c0), 0x0}, 0x20) 04:47:19 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r4, 0x0, 0x0) keyctl$assume_authority(0x10, r4) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d8050005", 0x29}], 0x1}, 0x0) 04:47:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f00000001c0), 0x0}, 0x20) 04:47:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f00000001c0), 0x0}, 0x20) 04:47:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c500", 0x2c}], 0x1}, 0x0) 04:47:20 executing program 4: r0 = socket$kcm(0xa, 0x8000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x25, &(0x7f0000000280), 0x4) 04:47:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c500", 0x2c}], 0x1}, 0x0) [ 786.872100][T13510] TCP: TCP_TX_DELAY enabled [ 788.450000][T13520] IPVS: ftp: loaded support on port[0] = 21 [ 788.513608][T13520] chnl_net:caif_netlink_parms(): no params data found [ 788.540256][T13520] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.547394][T13520] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.555048][T13520] device bridge_slave_0 entered promiscuous mode [ 788.562584][T13520] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.570023][T13520] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.578039][T13520] device bridge_slave_1 entered promiscuous mode [ 788.595702][T13520] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 788.606416][T13520] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 788.625923][T13520] team0: Port device team_slave_0 added [ 788.632610][T13520] team0: Port device team_slave_1 added [ 788.689520][T13520] device hsr_slave_0 entered promiscuous mode [ 788.747308][T13520] device hsr_slave_1 entered promiscuous mode [ 788.797020][T13520] debugfs: Directory 'hsr0' with parent '/' already present! [ 788.811489][T13520] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.818772][T13520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 788.826004][T13520] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.833169][T13520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 788.862701][T13520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 788.874246][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 788.882509][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.890985][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.899820][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 788.912622][T13520] 8021q: adding VLAN 0 to HW filter on device team0 [ 788.922845][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 788.931730][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.938795][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 788.953374][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 788.962074][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.969294][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 788.983063][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 788.998428][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 789.007018][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 789.015757][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 789.028431][T13520] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 789.039506][T13520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 789.048159][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 789.066415][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 789.074064][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 789.085619][T13520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 791.007374][ T7921] device bridge_slave_1 left promiscuous mode [ 791.013681][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.077539][ T7921] device bridge_slave_0 left promiscuous mode [ 791.083738][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.807153][ T7921] device hsr_slave_0 left promiscuous mode [ 791.846972][ T7921] device hsr_slave_1 left promiscuous mode [ 791.894329][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 791.904643][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 791.915934][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 791.970953][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 792.030354][ T7921] bond0 (unregistering): Released all slaves 04:47:28 executing program 5: 04:47:28 executing program 2: 04:47:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c500", 0x2c}], 0x1}, 0x0) 04:47:28 executing program 4: 04:47:28 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:28 executing program 4: 04:47:28 executing program 2: 04:47:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083", 0x2d}], 0x1}, 0x0) 04:47:29 executing program 4: 04:47:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x686987548330b3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000640)={0x2, {{0x2, 0x0, @multicast1}}}, 0x108) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r6, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) 04:47:29 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = creat(0x0, 0x10003) write$binfmt_script(r5, 0x0, 0x0) close(r5) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000180)) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x0, 0xffcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000140)={0x30, 0x0, 0x1, 0x1, 0x7fff, 0x6, 0xdd9, 0x4}, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) [ 797.802260][T13582] IPVS: ftp: loaded support on port[0] = 21 [ 797.855489][T13582] chnl_net:caif_netlink_parms(): no params data found [ 797.882600][T13582] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.889811][T13582] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.897803][T13582] device bridge_slave_0 entered promiscuous mode [ 797.905655][T13582] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.912793][T13582] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.920614][T13582] device bridge_slave_1 entered promiscuous mode [ 797.938673][T13582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 797.949491][T13582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 797.970695][T13582] team0: Port device team_slave_0 added [ 797.977572][T13582] team0: Port device team_slave_1 added [ 798.029702][T13582] device hsr_slave_0 entered promiscuous mode [ 798.067231][T13582] device hsr_slave_1 entered promiscuous mode [ 798.106967][T13582] debugfs: Directory 'hsr0' with parent '/' already present! [ 798.121021][T13582] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.128249][T13582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.135624][T13582] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.142767][T13582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 798.173084][T13582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 798.184527][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 798.193064][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.201039][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.210485][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 798.222573][T13582] 8021q: adding VLAN 0 to HW filter on device team0 [ 798.233769][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 798.242783][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.249851][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 798.261051][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 798.269571][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.276670][ T2609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.295315][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 798.304317][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 798.315590][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 798.326677][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 798.338318][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 798.352255][T13582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 798.366827][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 798.374362][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 798.388741][T13582] 8021q: adding VLAN 0 to HW filter on device batadv0 04:47:32 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa20c4d99f10cc6297fadb9b3853c78451263e89b340b34dd1361e3d845347b7de0e9a7cc254d63"], 0x34) close(r6) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000180)) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x0, 0xffcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000140)={0x30, 0x0, 0x1, 0x1, 0x7fff, 0x6, 0xdd9, 0x4}, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) 04:47:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083", 0x2d}], 0x1}, 0x0) 04:47:32 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="fb9e472d67a0fdce597518d90a2271e4a978502f98dd42a21d8f4254ac1f0c79a60d9566d59e27ec48bdaa47ecd6b8e91061dc8786a558e46b5c0b8c30e831cacee7d963d25a3bae868092729529cdd207ab", 0x52, 0x0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2000, 0x0) sendto$packet(r2, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@local, @mcast1, @empty, 0x1, 0xffff, 0x6, 0x100, 0x1000000000, 0x0, r4}) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_triestat\x00') read$char_usb(r5, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="fb9e472d67a0fdce597518d90a2271e4a978502f98dd42a21d8f4254ac1f0c79a60d9566d59e27ec48bdaa47ecd6b8e91061dc8786a558e46b5c0b8c30e831cacee7d963d25a3bae868092729529cdd207abaf13b03e8a85529bf9d647e732bdafc7c8a2f280bb6f1fc344501c", 0x6d, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp], 0x1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000580)={@dev}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000900)={@local}, &(0x7f0000000940)=0x14) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_triestat\x00') read$char_usb(r7, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r7, 0x890c, &(0x7f00000003c0)={@local, @mcast1, @empty, 0x1, 0x0, 0x6, 0x100, 0x1000000000, 0x200}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_open_procfs(0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000008200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={@local, @mcast1, @empty, 0x1, 0x0, 0x0, 0x100, 0x1000000000, 0x200, r8}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="fb9e472d67a0fdce597518d90a2271e4a978502f98dd42a21d8f4254ac1f0c79a60d9566d59e27ec48bdaa47ecd6b8e91061dc8786a558e46b5c0b8c30e831cacee7d963d25a3bae868092729529cdd207abaf13b03e8a85529bf9d647e732bdafc7c8a2f280", 0x66, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp], 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008440)={{{@in6=@mcast2, @in6=@ipv4={[], [], @empty}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, 0x0) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) getresuid(0x0, 0x0, &(0x7f0000000300)) 04:47:32 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x686987548330b3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000640)={0x2, {{0x2, 0x0, @multicast1}}}, 0x108) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r6, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) 04:47:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30306000a000200080ada1b40d805000500c50083", 0x2d}], 0x1}, 0x0) 04:47:33 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000009c0)) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca", 0x25) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0xff57, 0x400, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 04:47:33 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa20c4d99f10cc6297fadb9b3853c78451263e89b340b34dd1361e3d845347b7de0e9a7cc254d63"], 0x34) close(r6) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000180)) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x0, 0xffcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000140)={0x30, 0x0, 0x1, 0x1, 0x7fff, 0x6, 0xdd9, 0x4}, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) 04:47:34 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000009c0)) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca", 0x25) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0xff57, 0x400, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 04:47:34 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7d, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) [ 801.657582][ T64] device bridge_slave_1 left promiscuous mode [ 801.664086][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.707629][ T64] device bridge_slave_0 left promiscuous mode [ 801.713865][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.487085][ T64] device hsr_slave_0 left promiscuous mode [ 802.526924][ T64] device hsr_slave_1 left promiscuous mode [ 802.577489][ T64] team0 (unregistering): Port device team_slave_1 removed [ 802.589406][ T64] team0 (unregistering): Port device team_slave_0 removed [ 802.600597][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 802.646515][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 802.706303][ T64] bond0 (unregistering): Released all slaves [ 802.823985][T13668] IPVS: ftp: loaded support on port[0] = 21 [ 802.882423][T13668] chnl_net:caif_netlink_parms(): no params data found [ 802.910911][T13668] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.918108][T13668] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.926184][T13668] device bridge_slave_0 entered promiscuous mode [ 802.982009][T13668] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.990107][T13668] bridge0: port 2(bridge_slave_1) entered disabled state [ 803.003290][T13668] device bridge_slave_1 entered promiscuous mode [ 803.027907][T13668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 803.043577][T13668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 803.064934][T13668] team0: Port device team_slave_0 added [ 803.077517][T13668] team0: Port device team_slave_1 added [ 803.174523][T13668] device hsr_slave_0 entered promiscuous mode [ 803.231721][T13668] device hsr_slave_1 entered promiscuous mode [ 803.286844][T13668] debugfs: Directory 'hsr0' with parent '/' already present! [ 803.309043][T13668] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.316130][T13668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.323431][T13668] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.330490][T13668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.378362][T13668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 803.391973][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 803.404436][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.412423][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 803.426703][T13668] 8021q: adding VLAN 0 to HW filter on device team0 [ 803.438805][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 803.447887][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.454922][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.472972][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 803.481981][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.489062][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.508583][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 803.518273][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 803.527567][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.539002][T13668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 803.550303][T13668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 803.558718][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 803.567156][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.586300][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 803.594284][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 803.605376][T13668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 804.579087][ T64] device bridge_slave_1 left promiscuous mode [ 804.585346][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.647570][ T64] device bridge_slave_0 left promiscuous mode [ 804.653880][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 804.947040][ T64] device hsr_slave_0 left promiscuous mode [ 804.987006][ T64] device hsr_slave_1 left promiscuous mode [ 805.034455][ T64] team0 (unregistering): Port device team_slave_1 removed [ 805.045231][ T64] team0 (unregistering): Port device team_slave_0 removed [ 805.055926][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 805.100180][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 805.180427][ T64] bond0 (unregistering): Released all slaves 04:47:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1f, 0x5480) 04:47:40 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000009c0)) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca", 0x25) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0xff57, 0x400, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 04:47:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7b, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) 04:47:40 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa20c4d99f10cc6297fadb9b3853c78451263e89b340b34dd1361e3d845347b7de0e9a7cc254d63"], 0x34) close(r6) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000180)) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x0, 0xffcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000140)={0x30, 0x0, 0x1, 0x1, 0x7fff, 0x6, 0xdd9, 0x4}, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) 04:47:40 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r5, 0x0, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x1b, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) 04:47:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr-camellia-aesni-avx2,nhpoly1305-generic)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) 04:47:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) [ 807.617429][ T64] device bridge_slave_1 left promiscuous mode [ 807.625728][ T64] bridge0: port 2(bridge_slave_1) entered disabled state 04:47:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf0554edc7de8ddeb133c2b3ce9fad90f15a36a15", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x1b3, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/160, 0x437}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/96, 0x60}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000480)=""/119, 0x77}, {&(0x7f0000000040)=""/14, 0xe}], 0x6}}], 0x4000000000004da, 0x42, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) getpid() [ 807.718723][ T64] device bridge_slave_0 left promiscuous mode [ 807.731390][ T64] bridge0: port 1(bridge_slave_0) entered disabled state 04:47:41 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:42 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 809.110536][ T64] device hsr_slave_0 left promiscuous mode [ 809.141055][ T64] device hsr_slave_1 left promiscuous mode [ 809.193352][ T64] team0 (unregistering): Port device team_slave_1 removed [ 809.204717][ T64] team0 (unregistering): Port device team_slave_0 removed [ 809.215011][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 809.261508][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 809.334010][ T64] bond0 (unregistering): Released all slaves [ 809.422679][T13743] IPVS: ftp: loaded support on port[0] = 21 [ 809.612378][T13743] chnl_net:caif_netlink_parms(): no params data found [ 809.651685][T13743] bridge0: port 1(bridge_slave_0) entered blocking state [ 809.658860][T13743] bridge0: port 1(bridge_slave_0) entered disabled state [ 809.670749][T13743] device bridge_slave_0 entered promiscuous mode [ 809.678566][T13743] bridge0: port 2(bridge_slave_1) entered blocking state [ 809.685633][T13743] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.698013][T13743] device bridge_slave_1 entered promiscuous mode [ 809.716721][T13743] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 809.741795][T13743] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 809.766706][T13743] team0: Port device team_slave_0 added [ 809.775114][T13743] team0: Port device team_slave_1 added [ 809.842048][T13743] device hsr_slave_0 entered promiscuous mode [ 809.891248][T13743] device hsr_slave_1 entered promiscuous mode [ 809.975573][T13743] bridge0: port 2(bridge_slave_1) entered blocking state [ 809.982657][T13743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 809.990078][T13743] bridge0: port 1(bridge_slave_0) entered blocking state [ 809.997163][T13743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 810.035912][T13743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 810.049737][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 810.058393][ T2609] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.066631][ T2609] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.081858][T13743] 8021q: adding VLAN 0 to HW filter on device team0 [ 810.092411][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 810.101432][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 810.108492][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 810.126072][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 810.136398][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 810.143463][ T2609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 810.158872][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 810.172394][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 810.181972][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 810.202856][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 810.216497][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 810.235605][T13743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 810.251844][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 810.259722][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 810.270759][T13743] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 812.197658][ T28] device bridge_slave_1 left promiscuous mode [ 812.204054][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.247643][ T28] device bridge_slave_0 left promiscuous mode [ 812.253846][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 812.997412][ T28] device hsr_slave_0 left promiscuous mode [ 813.036921][ T28] device hsr_slave_1 left promiscuous mode [ 813.087018][ T28] team0 (unregistering): Port device team_slave_1 removed [ 813.100195][ T28] team0 (unregistering): Port device team_slave_0 removed [ 813.110627][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 813.161251][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 813.239005][ T28] bond0 (unregistering): Released all slaves 04:47:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf0554edc7de8ddeb133c2b3ce9fad90f15a36a15", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x1b3, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/160, 0x437}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/96, 0x60}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000480)=""/119, 0x77}, {&(0x7f0000000040)=""/14, 0xe}], 0x6}}], 0x4000000000004da, 0x42, 0x0) 04:47:47 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr-camellia-aesni-avx2,nhpoly1305-generic)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) 04:47:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 04:47:47 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x98428d57a99b5f44) io_setup(0xc, &(0x7f0000000100)=0x0) io_submit(r4, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fallocate(r0, 0x100000003, 0x0, 0x28120001) 04:47:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a027fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000414900000004fcff", 0x58}], 0x1) setsockopt(r1, 0x80000000, 0x1, &(0x7f0000000140)="58a752a2e3eb031a7c2d4fe3e80a3b4f318dd89a7d405c97056418053fcdf0e97c17e2e52cb43666cb2c5588f200631825acfa659f105fe5b167e58a9c2b40de2d8a067e5507b35f26ec61b80a8105000000000000004b1b8cc44bc4db2d8a4cb9fee913db72c971f405e8d2ff80ea007cd592a091fc984e4d0d41c7745ecb4cbc5a894af4e94ee61644e0e551f9d3b062a2cb12", 0xfffffffffffffe23) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FIGETBSZ(r2, 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) socket$inet_udplite(0x2, 0x2, 0x88) r3 = accept4(r0, 0x0, 0x0, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr=0x2}, 0x10) sendto$inet(r3, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 814.365420][T13775] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 04:47:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) getsockopt$netlink(r2, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 04:47:47 executing program 4: 04:47:48 executing program 0: 04:47:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 04:47:48 executing program 4: [ 816.536242][T13810] IPVS: ftp: loaded support on port[0] = 21 [ 816.588084][T13810] chnl_net:caif_netlink_parms(): no params data found [ 816.614737][T13810] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.621914][T13810] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.629931][T13810] device bridge_slave_0 entered promiscuous mode [ 816.637279][T13810] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.644480][T13810] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.652395][T13810] device bridge_slave_1 entered promiscuous mode [ 816.670859][T13810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 816.681789][T13810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 816.701042][T13810] team0: Port device team_slave_0 added [ 816.707939][T13810] team0: Port device team_slave_1 added [ 816.759601][T13810] device hsr_slave_0 entered promiscuous mode [ 816.797220][T13810] device hsr_slave_1 entered promiscuous mode [ 816.844515][T13810] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.851622][T13810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 816.858921][T13810] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.866037][T13810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.899478][T13810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 816.912209][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 816.921062][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.929340][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.938764][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 816.951758][T13810] 8021q: adding VLAN 0 to HW filter on device team0 [ 816.963159][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 816.972471][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.979530][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.998791][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.007658][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.014669][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.023460][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 817.033332][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 817.044367][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 817.060375][T13810] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 817.071190][T13810] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 817.083533][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 817.092441][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 817.101528][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 817.116238][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 817.123761][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 817.135495][T13810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 819.077276][ T28] device bridge_slave_1 left promiscuous mode [ 819.083520][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.147833][ T28] device bridge_slave_0 left promiscuous mode [ 819.154284][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.897243][ T28] device hsr_slave_0 left promiscuous mode [ 819.937035][ T28] device hsr_slave_1 left promiscuous mode [ 819.984190][ T28] team0 (unregistering): Port device team_slave_1 removed [ 819.994572][ T28] team0 (unregistering): Port device team_slave_0 removed [ 820.004676][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 820.061081][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 820.157951][ T28] bond0 (unregistering): Released all slaves 04:47:56 executing program 5: 04:47:56 executing program 0: 04:47:56 executing program 4: 04:47:56 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:47:56 executing program 2: 04:47:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:47:56 executing program 4: 04:47:57 executing program 0: 04:47:57 executing program 2: 04:47:57 executing program 4: 04:47:57 executing program 0: 04:47:57 executing program 2: [ 825.678191][T13852] IPVS: ftp: loaded support on port[0] = 21 [ 825.730663][T13852] chnl_net:caif_netlink_parms(): no params data found [ 825.758070][T13852] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.765203][T13852] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.772979][T13852] device bridge_slave_0 entered promiscuous mode [ 825.780650][T13852] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.788151][T13852] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.795875][T13852] device bridge_slave_1 entered promiscuous mode [ 825.813309][T13852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 825.824371][T13852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 825.843699][T13852] team0: Port device team_slave_0 added [ 825.850465][T13852] team0: Port device team_slave_1 added [ 825.929054][T13852] device hsr_slave_0 entered promiscuous mode [ 825.997501][T13852] device hsr_slave_1 entered promiscuous mode [ 826.044739][T13852] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.051968][T13852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.059433][T13852] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.066508][T13852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.100974][T13852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 826.112585][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 826.122033][ T2609] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.130012][ T2609] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.139461][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 826.151976][T13852] 8021q: adding VLAN 0 to HW filter on device team0 [ 826.163868][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 826.172914][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.180062][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.200207][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.208754][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.215924][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.225646][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 826.235007][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 826.246906][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 826.258698][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.272440][T13852] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 826.283743][T13852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 826.295736][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 826.312070][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 826.320082][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 826.333860][T13852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 828.287750][ T7936] device bridge_slave_1 left promiscuous mode [ 828.294143][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.367765][ T7936] device bridge_slave_0 left promiscuous mode [ 828.373997][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.097141][ T7936] device hsr_slave_0 left promiscuous mode [ 829.146951][ T7936] device hsr_slave_1 left promiscuous mode [ 829.193812][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 829.204153][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 829.213928][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 829.270942][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 829.337157][ T7936] bond0 (unregistering): Released all slaves 04:48:03 executing program 5: 04:48:03 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000b31000/0x2000)=nil, 0x2000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r5) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:48:03 executing program 2: 04:48:03 executing program 4: 04:48:03 executing program 0: 04:48:03 executing program 4: 04:48:03 executing program 0: 04:48:03 executing program 2: 04:48:03 executing program 4: 04:48:03 executing program 2: 04:48:03 executing program 0: [ 832.119051][T13894] IPVS: ftp: loaded support on port[0] = 21 [ 832.171506][T13894] chnl_net:caif_netlink_parms(): no params data found [ 832.197113][T13894] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.204279][T13894] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.212285][T13894] device bridge_slave_0 entered promiscuous mode [ 832.219819][T13894] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.227002][T13894] bridge0: port 2(bridge_slave_1) entered disabled state [ 832.234738][T13894] device bridge_slave_1 entered promiscuous mode [ 832.252606][T13894] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 832.262968][T13894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 832.282046][T13894] team0: Port device team_slave_0 added [ 832.288800][T13894] team0: Port device team_slave_1 added [ 832.359460][T13894] device hsr_slave_0 entered promiscuous mode [ 832.397353][T13894] device hsr_slave_1 entered promiscuous mode [ 832.473753][T13894] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.480976][T13894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 832.488308][T13894] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.495398][T13894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 832.529048][T13894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 832.540128][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 832.548723][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.556722][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 832.565675][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 832.578517][T13894] 8021q: adding VLAN 0 to HW filter on device team0 [ 832.589413][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 832.598445][ T2609] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.605498][ T2609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 832.616107][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 832.626073][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.633141][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 832.651269][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 832.660597][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 832.672356][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 832.687976][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 832.699994][T13894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 832.711899][T13894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 832.720191][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 832.738060][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 832.745539][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 832.755439][T13894] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 834.697552][ T7936] device bridge_slave_1 left promiscuous mode [ 834.703803][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.767518][ T7936] device bridge_slave_0 left promiscuous mode [ 834.774051][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.487136][ T7936] device hsr_slave_0 left promiscuous mode [ 835.539767][ T7936] device hsr_slave_1 left promiscuous mode [ 835.584233][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 835.594610][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 835.604616][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 835.670299][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 835.748696][ T7936] bond0 (unregistering): Released all slaves 04:48:09 executing program 5: 04:48:09 executing program 2: 04:48:09 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000000)=[{}, {r0}, {r1, 0x200}], 0x3, 0x0) 04:48:09 executing program 0: 04:48:09 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:48:09 executing program 2: 04:48:09 executing program 0: 04:48:09 executing program 4: 04:48:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="0d00c7fb00003639408f00000000000001ff9dff5112fbccf0a6981a14a3e260c650b5edacdebafdb69d4a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544537622e29ecc24d6c010628ab7073496678d306bed5103000000de2e36ff47696d24ec89f61c738002fcf0cf3ace8350aa672c120d72e496fbc6ffd818fc466a98f8631ff4e38eb2767a82d8e38aa709a84293db7623b58c8087", 0xaa}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0, 0xa}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:48:09 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:48:10 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c65302093"], 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 836.812355][T13926] ptrace attach of "/root/syz-executor.2"[13925] was attempted by "/root/syz-executor.2"[13926] [ 838.759385][T13942] IPVS: ftp: loaded support on port[0] = 21 [ 838.821061][T13942] chnl_net:caif_netlink_parms(): no params data found [ 838.847728][T13942] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.855029][T13942] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.863011][T13942] device bridge_slave_0 entered promiscuous mode [ 838.870461][T13942] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.877670][T13942] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.885462][T13942] device bridge_slave_1 entered promiscuous mode [ 838.902805][T13942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 838.913210][T13942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 838.932265][T13942] team0: Port device team_slave_0 added [ 838.939118][T13942] team0: Port device team_slave_1 added [ 839.018876][T13942] device hsr_slave_0 entered promiscuous mode [ 839.067339][T13942] device hsr_slave_1 entered promiscuous mode [ 839.114672][T13942] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.121779][T13942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.129296][T13942] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.136328][T13942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.169150][T13942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 839.182296][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 839.191076][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.198890][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.208115][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 839.220831][T13942] 8021q: adding VLAN 0 to HW filter on device team0 [ 839.232330][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 839.240963][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.248014][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.258856][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 839.267532][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.274553][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.294018][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 839.302992][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 839.315231][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 839.331232][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 839.340219][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 839.350962][T13942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 839.364888][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 839.372729][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 839.385694][T13942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 841.317472][ T7936] device bridge_slave_1 left promiscuous mode [ 841.323893][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.357684][ T7936] device bridge_slave_0 left promiscuous mode [ 841.363979][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.077309][ T7936] device hsr_slave_0 left promiscuous mode [ 842.146860][ T7936] device hsr_slave_1 left promiscuous mode [ 842.233443][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 842.243552][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 842.253712][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 842.320342][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:48:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000100)={0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x2}) syz_open_dev$midi(0x0, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) 04:48:15 executing program 2: read(0xffffffffffffffff, 0x0, 0x23b) openat$vcs(0xffffffffffffff9c, 0x0, 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2, 0x14, 0x23}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x23}) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) syz_open_dev$vbi(0x0, 0x2, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:48:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x81a0ae8c, 0x0) dup2(r3, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:48:15 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:15 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r2, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:48:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 842.397967][ T7936] bond0 (unregistering): Released all slaves 04:48:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) 04:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008440), 0x400000000000107, 0x0) 04:48:16 executing program 2: openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) ioprio_get$uid(0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 04:48:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:17 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000), 0x2) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x9}, 0xf) 04:48:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/245, 0xf5}], 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/245, 0xf5}], 0x1) recvmmsg(r2, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) recvmmsg(r1, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 845.162967][T14019] IPVS: ftp: loaded support on port[0] = 21 [ 845.217332][T14019] chnl_net:caif_netlink_parms(): no params data found [ 845.244329][T14019] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.251458][T14019] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.259390][T14019] device bridge_slave_0 entered promiscuous mode [ 845.266718][T14019] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.274020][T14019] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.281706][T14019] device bridge_slave_1 entered promiscuous mode [ 845.298616][T14019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 845.309556][T14019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 845.328540][T14019] team0: Port device team_slave_0 added [ 845.335089][T14019] team0: Port device team_slave_1 added [ 845.399429][T14019] device hsr_slave_0 entered promiscuous mode [ 845.438439][T14019] device hsr_slave_1 entered promiscuous mode [ 845.485116][T14019] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.492284][T14019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 845.499646][T14019] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.506674][T14019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 845.556231][T14019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 845.580526][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 845.589073][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.596969][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.605689][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 845.617185][T14019] 8021q: adding VLAN 0 to HW filter on device team0 [ 845.628642][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 845.637429][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.644438][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 845.657512][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 845.666206][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.673270][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 845.688273][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 845.697546][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 845.709936][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 845.723896][T14019] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 845.735355][T14019] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 845.747750][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 845.756578][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 845.765131][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 845.780011][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 845.787570][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 845.799347][T14019] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 847.697671][ T7936] device bridge_slave_1 left promiscuous mode [ 847.703843][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.767412][ T7936] device bridge_slave_0 left promiscuous mode [ 847.773598][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.517326][ T7936] device hsr_slave_0 left promiscuous mode [ 848.607045][ T7936] device hsr_slave_1 left promiscuous mode [ 848.654058][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 848.664411][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 848.675577][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 848.719963][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 848.799457][ T7936] bond0 (unregistering): Released all slaves 04:48:26 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r2, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:48:26 executing program 4: 04:48:26 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000300)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754", 0x91, 0xa}], 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:48:26 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r2, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:48:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:48:26 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r2, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 853.277656][T14045] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 853.326911][T14045] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 853.377033][T14045] EXT4-fs (loop2): mount failed 04:48:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001340)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:48:27 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000300)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754", 0x91, 0xa}], 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:48:27 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) dup2(r1, r0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 853.959022][T14073] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 854.018936][T14073] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 854.044565][T14073] EXT4-fs (loop2): mount failed 04:48:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x14, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) [ 855.651530][T14105] IPVS: ftp: loaded support on port[0] = 21 [ 855.705816][T14105] chnl_net:caif_netlink_parms(): no params data found [ 855.732814][T14105] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.740306][T14105] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.748239][T14105] device bridge_slave_0 entered promiscuous mode [ 855.755698][T14105] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.762819][T14105] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.770644][T14105] device bridge_slave_1 entered promiscuous mode [ 855.788680][T14105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 855.799918][T14105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 855.818153][T14105] team0: Port device team_slave_0 added [ 855.824838][T14105] team0: Port device team_slave_1 added [ 855.899417][T14105] device hsr_slave_0 entered promiscuous mode [ 855.937148][T14105] device hsr_slave_1 entered promiscuous mode [ 856.015289][T14105] bridge0: port 2(bridge_slave_1) entered blocking state [ 856.022389][T14105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 856.029756][T14105] bridge0: port 1(bridge_slave_0) entered blocking state [ 856.036836][T14105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 856.075995][T14105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 856.096492][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 856.105299][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 856.113897][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 856.124076][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 856.136191][T14105] 8021q: adding VLAN 0 to HW filter on device team0 [ 856.147985][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 856.156591][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 856.163693][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 856.174633][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 856.183434][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 856.190478][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 856.209252][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 856.219134][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 856.237596][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 856.247239][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 856.255889][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 856.266974][T14105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 856.281548][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 856.289318][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 856.300169][T14105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 858.207491][ T7872] device bridge_slave_1 left promiscuous mode [ 858.213743][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state [ 858.277704][ T7872] device bridge_slave_0 left promiscuous mode [ 858.283925][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state [ 859.007338][ T7872] device hsr_slave_0 left promiscuous mode [ 859.056931][ T7872] device hsr_slave_1 left promiscuous mode [ 859.124360][ T7872] team0 (unregistering): Port device team_slave_1 removed [ 859.134638][ T7872] team0 (unregistering): Port device team_slave_0 removed [ 859.144974][ T7872] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 859.201324][ T7872] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 859.278474][ T7872] bond0 (unregistering): Released all slaves 04:48:34 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r2, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:48:34 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:34 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) dup2(r1, r0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:34 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000300)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754", 0x91, 0xa}], 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:48:34 executing program 0: 04:48:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:48:34 executing program 0: [ 861.610863][T14126] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 861.631351][T14126] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 861.654771][T14126] EXT4-fs (loop2): mount failed 04:48:35 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:35 executing program 0: 04:48:35 executing program 2: 04:48:35 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:35 executing program 0: [ 863.884136][T14164] IPVS: ftp: loaded support on port[0] = 21 [ 863.937254][T14164] chnl_net:caif_netlink_parms(): no params data found [ 863.963197][T14164] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.970515][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.978514][T14164] device bridge_slave_0 entered promiscuous mode [ 863.986298][T14164] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.993700][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.001738][T14164] device bridge_slave_1 entered promiscuous mode [ 864.019150][T14164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 864.029800][T14164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 864.047772][T14164] team0: Port device team_slave_0 added [ 864.054371][T14164] team0: Port device team_slave_1 added [ 864.139034][T14164] device hsr_slave_0 entered promiscuous mode [ 864.197253][T14164] device hsr_slave_1 entered promiscuous mode [ 864.262953][T14164] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.270283][T14164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 864.278396][T14164] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.285847][T14164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 864.320356][T14164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 864.332635][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 864.341715][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.354164][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.363784][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 864.376227][T14164] 8021q: adding VLAN 0 to HW filter on device team0 [ 864.388715][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 864.397898][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.405510][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 864.417582][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 864.426240][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.433605][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 864.452345][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 864.461594][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 864.477881][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 864.493430][T14164] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 864.505252][T14164] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 864.519257][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.528485][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 864.537432][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 864.556055][T14164] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 864.563487][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 864.575857][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 866.527459][ T7921] device bridge_slave_1 left promiscuous mode [ 866.533782][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.567718][ T7921] device bridge_slave_0 left promiscuous mode [ 866.574202][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.287371][ T7921] device hsr_slave_0 left promiscuous mode [ 867.337174][ T7921] device hsr_slave_1 left promiscuous mode [ 867.393524][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 867.404373][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 867.415390][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 867.450804][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 867.538125][ T7921] bond0 (unregistering): Released all slaves 04:48:44 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c6530209379"], 0xd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r2, &(0x7f0000000700)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) getegid() ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:48:44 executing program 0: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) listen(r0, 0x80) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='$', 0x1) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write(r2, &(0x7f0000000380), 0xfffffffe) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x80000) sendto$inet6(r3, &(0x7f0000000040)="789327dcf17bc3e8394ec10e0fd060b46f56aa3388a720fb988858ccbe598e5d11", 0xfffffffffffffd24, 0x0, 0x0, 0x0) 04:48:44 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:44 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) dup2(r1, r0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:44 executing program 2: 04:48:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:48:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:48:44 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:44 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:44 executing program 2: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) syslog(0x2, &(0x7f0000000100)=""/19, 0x13) 04:48:44 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:45 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(0x0, 0x0, 0x3895) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) [ 873.179721][T14226] IPVS: ftp: loaded support on port[0] = 21 [ 873.234583][T14226] chnl_net:caif_netlink_parms(): no params data found [ 873.261728][T14226] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.269615][T14226] bridge0: port 1(bridge_slave_0) entered disabled state [ 873.277888][T14226] device bridge_slave_0 entered promiscuous mode [ 873.288604][T14226] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.296122][T14226] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.304826][T14226] device bridge_slave_1 entered promiscuous mode [ 873.323560][T14226] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 873.334691][T14226] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 873.354272][T14226] team0: Port device team_slave_0 added [ 873.361473][T14226] team0: Port device team_slave_1 added [ 873.419989][T14226] device hsr_slave_0 entered promiscuous mode [ 873.477327][T14226] device hsr_slave_1 entered promiscuous mode [ 873.574377][T14226] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.581864][T14226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 873.589280][T14226] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.596924][T14226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.631511][T14226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 873.643294][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.653229][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 873.661506][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.671052][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 873.683816][T14226] 8021q: adding VLAN 0 to HW filter on device team0 [ 873.696908][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 873.705672][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.713196][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.725360][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 873.734516][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.741919][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 873.760964][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 873.779714][T14226] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 873.790574][T14226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 873.803419][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 873.812338][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 873.821387][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 873.830354][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 873.839431][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 873.854874][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 873.862495][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 873.873739][T14226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 875.757442][ T7921] device bridge_slave_1 left promiscuous mode [ 875.763826][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.827677][ T7921] device bridge_slave_0 left promiscuous mode [ 875.833953][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.547251][ T7921] device hsr_slave_0 left promiscuous mode [ 876.607099][ T7921] device hsr_slave_1 left promiscuous mode [ 876.654396][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 876.665500][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 876.676024][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 876.731354][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 876.801830][ T7921] bond0 (unregistering): Released all slaves 04:48:51 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@empty, @dev}, &(0x7f00000002c0)=0xc) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000300)={0x1d, 0x0, 0x0, {0x0, 0x2}, 0xfe}, 0x18) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:48:51 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:51 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:48:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x2) dup3(r1, 0xffffffffffffffff, 0x0) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 04:48:51 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(0x0, 0x0, 0x3895) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 04:48:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:48:51 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:51 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:51 executing program 2: 04:48:52 executing program 2: 04:48:52 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:48:52 executing program 2: [ 880.438453][T14274] IPVS: ftp: loaded support on port[0] = 21 [ 880.501274][T14274] chnl_net:caif_netlink_parms(): no params data found [ 880.526532][T14274] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.533760][T14274] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.542170][T14274] device bridge_slave_0 entered promiscuous mode [ 880.550056][T14274] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.557307][T14274] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.565033][T14274] device bridge_slave_1 entered promiscuous mode [ 880.582821][T14274] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 880.594311][T14274] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 880.613056][T14274] team0: Port device team_slave_0 added [ 880.619734][T14274] team0: Port device team_slave_1 added [ 880.669260][T14274] device hsr_slave_0 entered promiscuous mode [ 880.707301][T14274] device hsr_slave_1 entered promiscuous mode [ 880.754726][T14274] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.761798][T14274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.769210][T14274] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.776244][T14274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 880.810932][T14274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 880.822438][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 880.831264][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.839609][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.849028][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 880.862131][T14274] 8021q: adding VLAN 0 to HW filter on device team0 [ 880.873897][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 880.882786][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.889891][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 880.909057][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 880.917893][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.924909][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.933924][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.943103][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 880.954342][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.967920][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 880.981267][T14274] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 880.992820][T14274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 881.001882][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 881.016986][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 881.024396][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 881.035870][T14274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 882.268487][ T28] device bridge_slave_1 left promiscuous mode [ 882.274670][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 882.327698][ T28] device bridge_slave_0 left promiscuous mode [ 882.333859][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 883.047313][ T28] device hsr_slave_0 left promiscuous mode [ 883.087268][ T28] device hsr_slave_1 left promiscuous mode [ 883.134277][ T28] team0 (unregistering): Port device team_slave_1 removed [ 883.144748][ T28] team0 (unregistering): Port device team_slave_0 removed [ 883.155118][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 883.211426][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 883.289009][ T28] bond0 (unregistering): Released all slaves 04:49:00 executing program 5: 04:49:00 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:00 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:00 executing program 0: 04:49:00 executing program 2: 04:49:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:49:00 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:00 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0}, 0x0) 04:49:00 executing program 0: write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000740)='net/icmp\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) ioctl$TCSETS(r2, 0x5402, 0x0) sendfile(r2, r0, 0x0, 0x6f0a77bd) 04:49:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000380)) dup2(r3, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:49:00 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:00 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r3, 0x0, 0x0) fstat(r3, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xfffffffffffffe8e) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000380)={@mcast2, 0x6, 0x2, 0xff, 0x9, 0xfff, 0x4}, &(0x7f00000009c0)=0x20) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca", 0x25) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x33}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0x0, 0x400, 0x6, 0x2000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) [ 889.081919][T14333] IPVS: ftp: loaded support on port[0] = 21 [ 889.133830][T14333] chnl_net:caif_netlink_parms(): no params data found [ 889.161237][T14333] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.168420][T14333] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.176339][T14333] device bridge_slave_0 entered promiscuous mode [ 889.184450][T14333] bridge0: port 2(bridge_slave_1) entered blocking state [ 889.191940][T14333] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.200046][T14333] device bridge_slave_1 entered promiscuous mode [ 889.216990][T14333] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 889.227751][T14333] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 889.247114][T14333] team0: Port device team_slave_0 added [ 889.253798][T14333] team0: Port device team_slave_1 added [ 889.309611][T14333] device hsr_slave_0 entered promiscuous mode [ 889.347312][T14333] device hsr_slave_1 entered promiscuous mode [ 889.403868][T14333] bridge0: port 2(bridge_slave_1) entered blocking state [ 889.410945][T14333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 889.418275][T14333] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.425292][T14333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 889.459165][T14333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 889.471496][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 889.480288][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.488536][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.497635][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 889.509750][T14333] 8021q: adding VLAN 0 to HW filter on device team0 [ 889.521477][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 889.530157][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.537201][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 889.548610][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 889.557502][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 889.564542][ T2609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 889.589764][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 889.599073][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 889.608577][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 889.617487][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 889.626087][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 889.636539][T14333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 889.652410][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 889.660207][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 889.671095][T14333] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 890.917375][ T7872] device bridge_slave_1 left promiscuous mode [ 890.923632][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.967697][ T7872] device bridge_slave_0 left promiscuous mode [ 890.973913][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.727185][ T7872] device hsr_slave_0 left promiscuous mode [ 891.767000][ T7872] device hsr_slave_1 left promiscuous mode [ 891.813972][ T7872] team0 (unregistering): Port device team_slave_1 removed [ 891.824647][ T7872] team0 (unregistering): Port device team_slave_0 removed [ 891.834931][ T7872] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 891.891513][ T7872] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 891.949876][ T7872] bond0 (unregistering): Released all slaves 04:49:08 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1a0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x80) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000940)=[{0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) ioctl$TIOCEXCL(r4, 0x540c) ftruncate(r3, 0x10099b7) sendfile(r2, r3, 0x0, 0xfffffffd) 04:49:08 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$VT_ACTIVATE(r1, 0x4b66, 0x8127000) 04:49:08 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:08 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r3, 0x0, 0x0) fstat(r3, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xfffffffffffffe8e) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000380)={@mcast2, 0x6, 0x2, 0xff, 0x9, 0xfff, 0x4}, &(0x7f00000009c0)=0x20) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca", 0x25) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x33}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0x0, 0x400, 0x6, 0x2000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 04:49:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:49:08 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:08 executing program 2: syz_emit_ethernet(0xae, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20000000180c289030086dd6076605100783afffe8003430005309b58927d90c5e70dff00000060000000ffff020000000000000000000000000001860090780007080060c5961e0000000005040000000000001803000005000001bb467fbc264c2d96b2c55265e0114569000c000001000000c20400000000050200fac10400000000c2020000c20400000000000000000000020000005e78c741097a9780d26b000000000000000000000000000000000000009e0f70124504fef121069226efbb7a84d4230d8ae431821e678eb3e0c5177a15d70b5a80cbd3c128b38c21337baf5b13c46bb03fa5a5a44a"], 0x0) 04:49:08 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:08 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 04:49:08 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:09 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 897.405504][T14388] IPVS: ftp: loaded support on port[0] = 21 [ 897.471397][T14388] chnl_net:caif_netlink_parms(): no params data found [ 897.499506][T14388] bridge0: port 1(bridge_slave_0) entered blocking state [ 897.507437][T14388] bridge0: port 1(bridge_slave_0) entered disabled state [ 897.515480][T14388] device bridge_slave_0 entered promiscuous mode [ 897.523316][T14388] bridge0: port 2(bridge_slave_1) entered blocking state [ 897.530544][T14388] bridge0: port 2(bridge_slave_1) entered disabled state [ 897.539082][T14388] device bridge_slave_1 entered promiscuous mode [ 897.555461][T14388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 897.566082][T14388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 897.585223][T14388] team0: Port device team_slave_0 added [ 897.591876][T14388] team0: Port device team_slave_1 added [ 897.649460][T14388] device hsr_slave_0 entered promiscuous mode [ 897.687226][T14388] device hsr_slave_1 entered promiscuous mode [ 897.734313][T14388] bridge0: port 2(bridge_slave_1) entered blocking state [ 897.741448][T14388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 897.748752][T14388] bridge0: port 1(bridge_slave_0) entered blocking state [ 897.755780][T14388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 897.789724][T14388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 897.802310][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 897.810646][T12733] bridge0: port 1(bridge_slave_0) entered disabled state [ 897.818705][T12733] bridge0: port 2(bridge_slave_1) entered disabled state [ 897.830907][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 897.843834][T14388] 8021q: adding VLAN 0 to HW filter on device team0 [ 897.854998][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 897.863900][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 897.870976][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 897.888145][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 897.896686][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 897.903815][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 897.915078][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 897.924875][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 897.940693][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 897.950450][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 897.963153][T14388] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 897.975709][T14388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 897.983990][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 897.999154][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 898.006656][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 898.019078][T14388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 899.257527][ T7936] device bridge_slave_1 left promiscuous mode [ 899.263747][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.308153][ T7936] device bridge_slave_0 left promiscuous mode [ 899.314325][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.037055][ T7936] device hsr_slave_0 left promiscuous mode [ 900.086937][ T7936] device hsr_slave_1 left promiscuous mode 04:49:13 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) recvmsg$kcm(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/47, 0x2f}], 0x1}, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x9}, 0xf) 04:49:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x56) setresuid(0x0, r1, 0x0) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) 04:49:13 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:13 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r3, 0x0, 0x0) fstat(r3, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xfffffffffffffe8e) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000380)={@mcast2, 0x6, 0x2, 0xff, 0x9, 0xfff, 0x4}, &(0x7f00000009c0)=0x20) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca", 0x25) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x33}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0x0, 0x400, 0x6, 0x2000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 04:49:13 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) ftruncate(0xffffffffffffffff, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 900.134557][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 900.145508][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 900.156559][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 900.236490][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:49:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) read(r0, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 04:49:13 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 900.440434][ T7936] bond0 (unregistering): Released all slaves 04:49:13 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:14 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = socket$unix(0x1, 0x5, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 04:49:14 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:14 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 902.699656][T14449] IPVS: ftp: loaded support on port[0] = 21 [ 902.753612][T14449] chnl_net:caif_netlink_parms(): no params data found [ 902.780262][T14449] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.787593][T14449] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.795225][T14449] device bridge_slave_0 entered promiscuous mode [ 902.803027][T14449] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.810187][T14449] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.818259][T14449] device bridge_slave_1 entered promiscuous mode [ 902.836357][T14449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 902.847115][T14449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 902.866213][T14449] team0: Port device team_slave_0 added [ 902.872940][T14449] team0: Port device team_slave_1 added [ 902.928897][T14449] device hsr_slave_0 entered promiscuous mode [ 902.987303][T14449] device hsr_slave_1 entered promiscuous mode [ 903.033627][T14449] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.040771][T14449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.048141][T14449] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.055365][T14449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.088904][T14449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 903.101757][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 903.110368][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.118411][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.127434][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 903.139083][T14449] 8021q: adding VLAN 0 to HW filter on device team0 [ 903.150776][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 903.159282][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.166399][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.177149][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 903.185762][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.192818][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.211340][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 903.220399][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 903.233005][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 903.245231][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 903.257421][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 903.268005][T14449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 903.283614][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 903.291715][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 903.302338][T14449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 904.527396][ T28] device bridge_slave_1 left promiscuous mode [ 904.533793][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.587689][ T28] device bridge_slave_0 left promiscuous mode [ 904.593899][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.317083][ T28] device hsr_slave_0 left promiscuous mode [ 905.360093][ T28] device hsr_slave_1 left promiscuous mode [ 905.424363][ T28] team0 (unregistering): Port device team_slave_1 removed [ 905.435457][ T28] team0 (unregistering): Port device team_slave_0 removed [ 905.445841][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 905.470647][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 905.538676][ T28] bond0 (unregistering): Released all slaves 04:49:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0xf, 0x0, &(0x7f0000a8a000)) 04:49:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x270, &(0x7f00000001c0)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYRES32]}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:49:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacde", 0x26}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:49:22 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:22 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) ftruncate(0xffffffffffffffff, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 909.567346][T14471] syz-executor.0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 04:49:22 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000180007841dfffd946f610500020081001f038b0504000800080012000a00ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff2", 0x41}], 0x1}, 0x0) 04:49:23 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:49:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@part={'part'}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 04:49:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x82, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) [ 910.122571][T14491] hfsplus: unable to parse mount options 04:49:23 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) [ 911.769966][T14510] IPVS: ftp: loaded support on port[0] = 21 [ 911.823332][T14510] chnl_net:caif_netlink_parms(): no params data found [ 911.849954][T14510] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.857188][T14510] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.864946][T14510] device bridge_slave_0 entered promiscuous mode [ 911.872508][T14510] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.879765][T14510] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.888341][T14510] device bridge_slave_1 entered promiscuous mode [ 911.905023][T14510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 911.915603][T14510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 911.934409][T14510] team0: Port device team_slave_0 added [ 911.941072][T14510] team0: Port device team_slave_1 added [ 912.018965][T14510] device hsr_slave_0 entered promiscuous mode [ 912.067173][T14510] device hsr_slave_1 entered promiscuous mode [ 912.114241][T14510] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.121318][T14510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.128652][T14510] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.135759][T14510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.169984][T14510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 912.181020][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 912.189472][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.197462][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.206454][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 912.219072][T14510] 8021q: adding VLAN 0 to HW filter on device team0 [ 912.230329][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 912.238918][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.245937][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.258942][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 912.268822][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.275835][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.294419][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 912.303812][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 912.316369][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 912.328897][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 912.341116][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 912.352214][T14510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 912.366930][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 912.374363][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 912.385419][T14510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 913.707736][ T28] device bridge_slave_1 left promiscuous mode [ 913.713962][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 913.757634][ T28] device bridge_slave_0 left promiscuous mode [ 913.763939][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.467046][ T28] device hsr_slave_0 left promiscuous mode [ 914.536991][ T28] device hsr_slave_1 left promiscuous mode [ 914.584094][ T28] team0 (unregistering): Port device team_slave_1 removed [ 914.594553][ T28] team0 (unregistering): Port device team_slave_0 removed [ 914.604762][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 914.650206][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 914.738688][ T28] bond0 (unregistering): Released all slaves [ 916.497521][ T28] device bridge_slave_1 left promiscuous mode [ 916.503805][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.557422][ T28] device bridge_slave_0 left promiscuous mode [ 916.563593][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.677199][ T28] device hsr_slave_0 left promiscuous mode [ 916.716921][ T28] device hsr_slave_1 left promiscuous mode [ 916.764003][ T28] team0 (unregistering): Port device team_slave_1 removed [ 916.774856][ T28] team0 (unregistering): Port device team_slave_0 removed [ 916.785148][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 916.810398][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 916.868415][ T28] bond0 (unregistering): Released all slaves 04:49:34 executing program 5: 04:49:34 executing program 0: 04:49:34 executing program 2: 04:49:34 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 04:49:34 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) ftruncate(0xffffffffffffffff, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:49:34 executing program 0: 04:49:34 executing program 2: 04:49:34 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 04:49:34 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 04:49:34 executing program 2: 04:49:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 923.031114][T14556] IPVS: ftp: loaded support on port[0] = 21 [ 923.083283][T14556] chnl_net:caif_netlink_parms(): no params data found [ 923.109210][T14556] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.116270][T14556] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.123986][T14556] device bridge_slave_0 entered promiscuous mode [ 923.131378][T14556] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.138472][T14556] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.146265][T14556] device bridge_slave_1 entered promiscuous mode [ 923.163455][T14556] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 923.175436][T14556] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 923.193646][T14556] team0: Port device team_slave_0 added [ 923.200483][T14556] team0: Port device team_slave_1 added [ 923.259335][T14556] device hsr_slave_0 entered promiscuous mode [ 923.297225][T14556] device hsr_slave_1 entered promiscuous mode [ 923.344051][T14556] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.351122][T14556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 923.358418][T14556] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.365557][T14556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 923.396410][T14556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 923.408181][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 923.416399][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.424672][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.433906][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 923.446384][T14556] 8021q: adding VLAN 0 to HW filter on device team0 [ 923.456957][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 923.465473][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.472539][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 923.484135][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 923.492789][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.499849][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 923.517106][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 923.526582][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 923.539985][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 923.553606][T14556] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 923.564213][T14556] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 923.576483][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 923.585299][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 923.593678][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 923.609747][T14556] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 923.618222][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 923.625743][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 924.787294][ T28] device bridge_slave_1 left promiscuous mode [ 924.793657][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.837512][ T28] device bridge_slave_0 left promiscuous mode [ 924.843745][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.557092][ T28] device hsr_slave_0 left promiscuous mode [ 925.606947][ T28] device hsr_slave_1 left promiscuous mode [ 925.673293][ T28] team0 (unregistering): Port device team_slave_1 removed [ 925.683787][ T28] team0 (unregistering): Port device team_slave_0 removed [ 925.701946][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 925.770534][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 925.849932][ T28] bond0 (unregistering): Released all slaves 04:49:40 executing program 5: 04:49:40 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 04:49:40 executing program 2: 04:49:40 executing program 0: 04:49:40 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:49:40 executing program 2: 04:49:40 executing program 0: 04:49:40 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 04:49:40 executing program 2: 04:49:40 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x0}) 04:49:40 executing program 0: [ 929.332915][T14598] IPVS: ftp: loaded support on port[0] = 21 [ 929.386488][T14598] chnl_net:caif_netlink_parms(): no params data found [ 929.413306][T14598] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.420471][T14598] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.428389][T14598] device bridge_slave_0 entered promiscuous mode [ 929.435719][T14598] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.443051][T14598] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.450999][T14598] device bridge_slave_1 entered promiscuous mode [ 929.468003][T14598] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 929.478419][T14598] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 929.496396][T14598] team0: Port device team_slave_0 added [ 929.502854][T14598] team0: Port device team_slave_1 added [ 929.559139][T14598] device hsr_slave_0 entered promiscuous mode [ 929.627212][T14598] device hsr_slave_1 entered promiscuous mode [ 929.684766][T14598] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.691892][T14598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 929.699243][T14598] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.706263][T14598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 929.737554][T14598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 929.748855][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 929.757767][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.765582][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.774587][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 929.786264][T14598] 8021q: adding VLAN 0 to HW filter on device team0 [ 929.798003][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 929.806396][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.813453][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 929.824412][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 929.833256][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.840301][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 929.857903][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 929.866569][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 929.877901][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 929.889620][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 929.901558][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 929.912099][T14598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 929.926674][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 929.934579][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 929.945313][T14598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 931.228494][ T7921] device bridge_slave_1 left promiscuous mode [ 931.234739][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.307602][ T7921] device bridge_slave_0 left promiscuous mode [ 931.313837][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 932.007400][ T7921] device hsr_slave_0 left promiscuous mode [ 932.067099][ T7921] device hsr_slave_1 left promiscuous mode [ 932.134107][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 932.144800][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 932.155312][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 932.191090][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 932.267906][ T7921] bond0 (unregistering): Released all slaves 04:49:48 executing program 0: 04:49:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:49:48 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x0}) 04:49:48 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:48 executing program 2: 04:49:48 executing program 5: 04:49:48 executing program 2: 04:49:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) 04:49:49 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x0}) 04:49:49 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 04:49:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0x0) open(0x0, 0x82040, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, 0x0, 0x0) connect$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 04:49:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) open(0x0, 0x82040, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)={0x0, 0x2}, 0xc) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) dup(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) connect$inet(r3, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000010c0)=0x19ff, 0x4) sendto$inet(r3, &(0x7f0000000140)="b0", 0x1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000400)=[{{&(0x7f0000000040)=@can, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/20, 0x14}], 0x1}, 0x2}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/157, 0x9d}}], 0x2, 0x40002002, 0x0) [ 936.047853][T12733] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 936.118862][T12733] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 936.148745][T14639] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 936.193808][T12733] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 936.272717][T12733] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 [ 937.973119][T14652] IPVS: ftp: loaded support on port[0] = 21 [ 938.025727][T14652] chnl_net:caif_netlink_parms(): no params data found [ 938.052488][T14652] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.059726][T14652] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.067832][T14652] device bridge_slave_0 entered promiscuous mode [ 938.075183][T14652] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.082512][T14652] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.090290][T14652] device bridge_slave_1 entered promiscuous mode [ 938.108113][T14652] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 938.119240][T14652] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 938.138181][T14652] team0: Port device team_slave_0 added [ 938.145084][T14652] team0: Port device team_slave_1 added [ 938.199423][T14652] device hsr_slave_0 entered promiscuous mode [ 938.247218][T14652] device hsr_slave_1 entered promiscuous mode [ 938.293698][T14652] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.300805][T14652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 938.308176][T14652] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.315308][T14652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 938.347692][T14652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.359483][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 938.367853][ T2609] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.375681][ T2609] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.384739][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 938.396470][T14652] 8021q: adding VLAN 0 to HW filter on device team0 [ 938.408117][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 938.416407][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.423464][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 938.439288][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 938.449226][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.456336][ T2609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 938.469495][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 938.478369][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 938.490932][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 938.504680][T14652] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 938.515581][T14652] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 938.528089][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 938.536649][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 938.545230][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 938.561826][T14652] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 938.569878][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 938.578133][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 939.817323][ T7921] device bridge_slave_1 left promiscuous mode [ 939.823521][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.887515][ T7921] device bridge_slave_0 left promiscuous mode [ 939.893928][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.607406][ T7921] device hsr_slave_0 left promiscuous mode [ 940.676909][ T7921] device hsr_slave_1 left promiscuous mode [ 940.742908][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 940.754157][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 940.764759][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 940.800780][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 940.858660][ T7921] bond0 (unregistering): Released all slaves 04:49:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, &(0x7f0000000100)) 04:49:57 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 04:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) open(0x0, 0x82040, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)={0x0, 0x2}, 0xc) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) dup(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) connect$inet(r3, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000010c0)=0x19ff, 0x4) sendto$inet(r3, &(0x7f0000000140)="b0", 0x1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000400)=[{{&(0x7f0000000040)=@can, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/20, 0x14}], 0x1}, 0x2}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/157, 0x9d}}], 0x2, 0x40002002, 0x0) 04:49:57 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x17, &(0x7f0000000380)={0x0, {}, 0x0, 0x0}, &(0x7f00000004c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000500)) 04:49:57 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:49:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:49:57 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'security.', 'syz'}, 0x0, 0x0, 0x0) 04:49:57 executing program 2: r0 = creat(&(0x7f0000000240)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) unlink(&(0x7f0000000040)='./file1\x00') clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x12) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 04:49:57 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'security.', 'syz'}, 0x0, 0x0, 0x0) 04:49:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x2001) ioctl$LOOP_SET_STATUS64(r0, 0x127d, &(0x7f0000000300)={0x600, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "abb4291ede5e270dd3f0a272134e830400000000000000d4210500000000000000ffffff7ffff7ef0900020000d147040013003e00", "141f2b09000000005080ce1da72300f700b284ddaa2a1d0000c0816a678a2f7d1f0000f700", "008000000000000000000000082010000000000000000800"}) 04:49:57 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='\x15\xa0B\xe3#\x1e4C\x86\xf9\xea(\x06\xec\xc8\xc1\x8f\xa5]\x9f\xee=\xb8\xb6\xbf\xb0\x90\x1b\xab\xe8\x00i\xf4Z\x04\xd4\xea\xd3O\xc62\x86\x11\xf4\xe9\xf8\xce\xb4u\xd7\xf6G\x80\xcbW2\xb7\xff\xfcF\xa5Nv\a\x17\xd8\"7\xb1,\xb8\xa4%]\x84\xe6\x8e\x12k\x87\x91#\xbaK\xbes\xec\xe1g\x824A\x88\xb7\xc5\r\xaa\x01\x1c\xbf\xcdD*|\x02\xb1\x1fx\xa6\x85\xed\xea\xf9\xcf\xa8\x94\xcc\xe0', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)='@\x00'}, 0x30) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)="0b6a929e87aeaba0ae0735845849fbad1b48b97e69c2bce3dee0a8f85aa9e833201e8baa8ec28de23919d11db4b635111412f9438de7acd03422e190c9b0fd88fe0bded7b7913a829d8b2c3e0b08065379b573235470a966f7f55eda8cf7a1dcd21b825e4359b74d1959f6cc1d3a07d5c4449e1f346fb35924f9427996c23c5d96da1fdc08eb3cfea01255c7020234f765be53691c91d29db5", 0x99}, {&(0x7f0000000500)="1e4cb10838378853b6de8403a32c2abe745e1dd2f43714c46761667cba9c0be13311cb8dda8f5e7e7b3db0e23285e97f8584f323ec450c3472d765f558a296ca7ee7fc62b263fffb1204d5df87e185f372006007ea5ce2e735ab0bcec537f4f51b5122f561b38f4557b4953f310c6b9e5c7ea9504bb6dbdb87e14ba8934f2c0b778a8fe68dcb1490e1ec02f2a77a4ce3e1836f4290be3e248353fdc209452b9b8413bd21f102fd2c2eb0347c10130a098f36490d5eba74b9", 0xb8}, {0x0}, {&(0x7f00000005c0)="6da737a3afd0713fd3e054fc6ef8bd918fa13a5010dec1fe4ad2fddad987a147446363fb41b590e51057c665070e2e964a9e", 0x32}, {&(0x7f0000000d80)="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", 0xf78}, {&(0x7f0000000700)}], 0x6, &(0x7f00000009c0)=ANY=[]}, 0x4000) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 04:49:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) [ 946.227637][T14713] IPVS: ftp: loaded support on port[0] = 21 [ 946.278398][T14713] chnl_net:caif_netlink_parms(): no params data found [ 946.305192][T14713] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.312510][T14713] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.320462][T14713] device bridge_slave_0 entered promiscuous mode [ 946.329169][T14713] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.336238][T14713] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.344378][T14713] device bridge_slave_1 entered promiscuous mode [ 946.361514][T14713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 946.371811][T14713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 946.390414][T14713] team0: Port device team_slave_0 added [ 946.397053][T14713] team0: Port device team_slave_1 added [ 946.469630][T14713] device hsr_slave_0 entered promiscuous mode [ 946.507270][T14713] device hsr_slave_1 entered promiscuous mode [ 946.574360][T14713] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.581512][T14713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 946.589638][T14713] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.596713][T14713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 946.627394][T14713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 946.639138][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 946.647660][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.655366][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.664341][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 946.676222][T14713] 8021q: adding VLAN 0 to HW filter on device team0 [ 946.687882][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 946.696426][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.703484][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 946.714133][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 946.722697][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.729740][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 946.747802][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 946.764666][T14713] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 946.775559][T14713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 946.789268][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 946.797679][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 946.806378][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 946.815003][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 946.823383][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 946.837886][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 946.845261][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 946.855430][T14713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 948.067440][ T7872] device bridge_slave_1 left promiscuous mode [ 948.073773][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state [ 948.117731][ T7872] device bridge_slave_0 left promiscuous mode [ 948.124033][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state [ 948.837568][ T7872] device hsr_slave_0 left promiscuous mode [ 948.876961][ T7872] device hsr_slave_1 left promiscuous mode [ 948.924378][ T7872] team0 (unregistering): Port device team_slave_1 removed [ 948.934875][ T7872] team0 (unregistering): Port device team_slave_0 removed [ 948.946115][ T7872] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 949.001071][ T7872] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 949.079180][ T7872] bond0 (unregistering): Released all slaves 04:50:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000003c0)=0x6, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x2e1) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, r1/1000+30000}, 0x10) sendto$inet6(r0, &(0x7f00000002c0)="fa01711425a6b42ddc5c46757f6b420f356f4f008ce309074327bfdd3558461fe59a8fd6186e0a11a693ed5f54b054e87042b72df1ce9aa8d1c176bea1239e42ab4119d8ebba7d7572e655238e8156a75410f44a7665b186275f2182aeae9570569bea3a5a5e22475ef4d24a9fa031de380e0d1a5ddf665a39fa4317200e1cf4457dd6a9c3a948a4d159e7c13db66c42327db092a6924604db4343b6386fd648d7e27be1cfc4ebcd71ff34048236cd59a7d4401307f3277e5ed875001a30134ed752a5b811689ab9c8", 0x1bb61c7074d8263f, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000140)=0xffffff6f, 0x4) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) 04:50:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 04:50:04 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0xfffffff9) 04:50:04 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='\x15\xa0B\xe3#\x1e4C\x86\xf9\xea(\x06\xec\xc8\xc1\x8f\xa5]\x9f\xee=\xb8\xb6\xbf\xb0\x90\x1b\xab\xe8\x00i\xf4Z\x04\xd4\xea\xd3O\xc62\x86\x11\xf4\xe9\xf8\xce\xb4u\xd7\xf6G\x80\xcbW2\xb7\xff\xfcF\xa5Nv\a\x17\xd8\"7\xb1,\xb8\xa4%]\x84\xe6\x8e\x12k\x87\x91#\xbaK\xbes\xec\xe1g\x824A\x88\xb7\xc5\r\xaa\x01\x1c\xbf\xcdD*|\x02\xb1\x1fx\xa6\x85\xed\xea\xf9\xcf\xa8\x94\xcc\xe0', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)='@\x00'}, 0x30) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)="0b6a929e87aeaba0ae0735845849fbad1b48b97e69c2bce3dee0a8f85aa9e833201e8baa8ec28de23919d11db4b635111412f9438de7acd03422e190c9b0fd88fe0bded7b7913a829d8b2c3e0b08065379b573235470a966f7f55eda8cf7a1dcd21b825e4359b74d1959f6cc1d3a07d5c4449e1f346fb35924f9427996c23c5d96da1fdc08eb3cfea01255c7020234f765be53691c91d29db5", 0x99}, {&(0x7f0000000500)="1e4cb10838378853b6de8403a32c2abe745e1dd2f43714c46761667cba9c0be13311cb8dda8f5e7e7b3db0e23285e97f8584f323ec450c3472d765f558a296ca7ee7fc62b263fffb1204d5df87e185f372006007ea5ce2e735ab0bcec537f4f51b5122f561b38f4557b4953f310c6b9e5c7ea9504bb6dbdb87e14ba8934f2c0b778a8fe68dcb1490e1ec02f2a77a4ce3e1836f4290be3e248353fdc209452b9b8413bd21f102fd2c2eb0347c10130a098f36490d5eba74b9", 0xb8}, {0x0}, {&(0x7f00000005c0)="6da737a3afd0713fd3e054fc6ef8bd918fa13a5010dec1fe4ad2fddad987a147446363fb41b590e51057c665070e2e964a9e", 0x32}, {&(0x7f0000000d80)="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", 0xf78}, {&(0x7f0000000700)}], 0x6, &(0x7f00000009c0)=ANY=[]}, 0x4000) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 04:50:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 951.155124][T14734] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 4294967289 > max in inode 16657 [ 951.173616][T14735] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 4294967289 > max in inode 16657 04:50:04 executing program 0: r0 = eventfd(0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000080)={r0}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) 04:50:04 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80001, 0x0) dup2(0xffffffffffffffff, r1) ioctl(0xffffffffffffffff, 0xffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x5, 0x100001, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000140)) r2 = socket(0x0, 0x2, 0x0) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket(0x1, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32, @ANYRES32=r0, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002", @ANYRES32, @ANYBLOB="000000000000000100"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 04:50:04 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='\x15\xa0B\xe3#\x1e4C\x86\xf9\xea(\x06\xec\xc8\xc1\x8f\xa5]\x9f\xee=\xb8\xb6\xbf\xb0\x90\x1b\xab\xe8\x00i\xf4Z\x04\xd4\xea\xd3O\xc62\x86\x11\xf4\xe9\xf8\xce\xb4u\xd7\xf6G\x80\xcbW2\xb7\xff\xfcF\xa5Nv\a\x17\xd8\"7\xb1,\xb8\xa4%]\x84\xe6\x8e\x12k\x87\x91#\xbaK\xbes\xec\xe1g\x824A\x88\xb7\xc5\r\xaa\x01\x1c\xbf\xcdD*|\x02\xb1\x1fx\xa6\x85\xed\xea\xf9\xcf\xa8\x94\xcc\xe0', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)='@\x00'}, 0x30) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)="0b6a929e87aeaba0ae0735845849fbad1b48b97e69c2bce3dee0a8f85aa9e833201e8baa8ec28de23919d11db4b635111412f9438de7acd03422e190c9b0fd88fe0bded7b7913a829d8b2c3e0b08065379b573235470a966f7f55eda8cf7a1dcd21b825e4359b74d1959f6cc1d3a07d5c4449e1f346fb35924f9427996c23c5d96da1fdc08eb3cfea01255c7020234f765be53691c91d29db5", 0x99}, {&(0x7f0000000500)="1e4cb10838378853b6de8403a32c2abe745e1dd2f43714c46761667cba9c0be13311cb8dda8f5e7e7b3db0e23285e97f8584f323ec450c3472d765f558a296ca7ee7fc62b263fffb1204d5df87e185f372006007ea5ce2e735ab0bcec537f4f51b5122f561b38f4557b4953f310c6b9e5c7ea9504bb6dbdb87e14ba8934f2c0b778a8fe68dcb1490e1ec02f2a77a4ce3e1836f4290be3e248353fdc209452b9b8413bd21f102fd2c2eb0347c10130a098f36490d5eba74b9", 0xb8}, {0x0}, {&(0x7f00000005c0)="6da737a3afd0713fd3e054fc6ef8bd918fa13a5010dec1fe4ad2fddad987a147446363fb41b590e51057c665070e2e964a9e", 0x32}, {&(0x7f0000000d80)="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", 0xf78}, {&(0x7f0000000700)}], 0x6, &(0x7f00000009c0)=ANY=[]}, 0x4000) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 04:50:04 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 04:50:05 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80001, 0x0) dup2(0xffffffffffffffff, r1) ioctl(0xffffffffffffffff, 0xffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x5, 0x100001, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000140)) r2 = socket(0x0, 0x2, 0x0) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket(0x1, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32, @ANYRES32=r0, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002", @ANYRES32, @ANYBLOB="000000000000000100"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 04:50:05 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) [ 951.842899][T14753] bond0: (slave bond_slave_1): Releasing backup interface [ 952.486139][T14759] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 952.509228][T14753] bond0: (slave bond_slave_1): Releasing backup interface [ 953.573848][T14774] IPVS: ftp: loaded support on port[0] = 21 [ 953.626058][T14774] chnl_net:caif_netlink_parms(): no params data found [ 953.652724][T14774] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.659856][T14774] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.667832][T14774] device bridge_slave_0 entered promiscuous mode [ 953.675098][T14774] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.682249][T14774] bridge0: port 2(bridge_slave_1) entered disabled state [ 953.690079][T14774] device bridge_slave_1 entered promiscuous mode [ 953.708079][T14774] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 953.718588][T14774] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 953.737719][T14774] team0: Port device team_slave_0 added [ 953.744314][T14774] team0: Port device team_slave_1 added [ 953.819447][T14774] device hsr_slave_0 entered promiscuous mode [ 953.857305][T14774] device hsr_slave_1 entered promiscuous mode [ 953.904393][T14774] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.911512][T14774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 953.918840][T14774] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.925925][T14774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 953.958562][T14774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 953.971309][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 953.979557][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.987749][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 954.000185][T14774] 8021q: adding VLAN 0 to HW filter on device team0 [ 954.011635][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 954.020832][ T2609] bridge0: port 1(bridge_slave_0) entered blocking state [ 954.027900][ T2609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 954.048803][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 954.057938][ T2609] bridge0: port 2(bridge_slave_1) entered blocking state [ 954.065059][ T2609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 954.074023][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 954.083071][ T2609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 954.094190][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 954.104871][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 954.116250][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 954.126054][T14774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 954.141477][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 954.149159][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 954.162855][T14774] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 955.527359][ T64] device bridge_slave_1 left promiscuous mode [ 955.533656][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.587697][ T64] device bridge_slave_0 left promiscuous mode [ 955.593999][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.297202][ T64] device hsr_slave_0 left promiscuous mode [ 956.347065][ T64] device hsr_slave_1 left promiscuous mode [ 956.393994][ T64] team0 (unregistering): Port device team_slave_1 removed [ 956.404415][ T64] team0 (unregistering): Port device team_slave_0 removed [ 956.414380][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 956.459964][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 956.548351][ T64] bond0 (unregistering): Released all slaves 04:50:12 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 04:50:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80001, 0x0) dup2(0xffffffffffffffff, r1) ioctl(0xffffffffffffffff, 0xffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x5, 0x100001, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000140)) r2 = socket(0x0, 0x2, 0x0) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket(0x1, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32, @ANYRES32=r0, @ANYBLOB="ac1e0001000000000000000000000000000004d62b000000000000000000000000000000000000011f000000000000000080000000000000000000000000000002b164290000000001010000000000000500000000000000020000000000000006000000000000000000000000000000070000000000000000000080ffffffffff0f00000000000006000000ffff00000600000027bd7000013500000a000620b40000000000000007000000080000003400080030000800010128004e49eece5f7e5b4adcafc9f7595092058eb83986a6f2f8f4ce70912edb51088e0788a208181f0593e4000600fe80000000000000000000000000001dff0100000000000000000000000000014e2400094e240000140020200000000064445447b5847b4056f5e819df056e331b3912b7ac1c980e8e8cdebcb6477219538e52eb061faa8fa8677ebc059609d12041abf46f48335c0670ad25b25f15cc82273c95a88b8ebdef0750cb8d833a3c7832236bfb5f80cc07b62c1bab834eb6b4c2c69451e488ec888be1dbf41a0769e2462431d3e5f6d1cc0e39e473748c97242c0bc78df0d3c789c05dad2dbf3695da5c52b768ee7eb13c67860ac5e1a4409799bd7bfc63e63edc40a2c847f450bd29ee780c358a2b68cd93399265bfdfada513c9b224842da7b8c72b3943ce85cce5eae5bd", @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002", @ANYRES32, @ANYBLOB="000000000000000100"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 04:50:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440), 0x400000000000107, 0x0) 04:50:12 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:12 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 04:50:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:50:13 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 959.838974][T14796] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 960.200008][T14805] bond0: (slave bond_slave_1): Releasing backup interface 04:50:13 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 04:50:14 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") r1 = socket$inet6(0xa, 0x803, 0xbf) connect$inet6(r1, &(0x7f0000000000), 0x1c) sendmmsg$inet6(r1, &(0x7f00000061c0), 0x400000000000183, 0x40a0990) [ 960.951327][T14814] bond0: (slave bond_slave_1): Releasing backup interface 04:50:14 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x1, 0x0) ioctl(r7, 0x80000000008936, &(0x7f0000000000)) sendmsg$NET_DM_CMD_STOP(r7, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) socket$inet6_tcp(0xa, 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) [ 961.627122][T14827] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 961.662296][T14827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 961.683416][T14827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:50:15 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 962.966112][T14825] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.973397][T14825] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.236398][T14846] IPVS: ftp: loaded support on port[0] = 21 [ 964.389337][T14846] chnl_net:caif_netlink_parms(): no params data found [ 964.441730][T14846] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.448961][T14846] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.456745][T14846] device bridge_slave_0 entered promiscuous mode [ 964.464965][T14846] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.476833][T14846] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.484677][T14846] device bridge_slave_1 entered promiscuous mode [ 964.504402][T14846] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 964.515325][T14846] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 964.536464][T14846] team0: Port device team_slave_0 added [ 964.543313][T14846] team0: Port device team_slave_1 added [ 964.611770][T14846] device hsr_slave_0 entered promiscuous mode [ 964.667285][T14846] device hsr_slave_1 entered promiscuous mode [ 964.744564][T14846] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.751686][T14846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.759004][T14846] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.766107][T14846] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.797775][T14846] 8021q: adding VLAN 0 to HW filter on device bond0 [ 964.809967][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 964.818771][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.827092][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.841362][T14846] 8021q: adding VLAN 0 to HW filter on device team0 [ 964.853075][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 964.862515][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.869638][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.887996][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.896327][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.903507][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.912358][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 964.924145][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 964.932362][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 964.943995][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 964.955265][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 964.965033][T14846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 964.982864][T14846] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 964.991296][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 964.998814][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 966.207602][ T28] device bridge_slave_1 left promiscuous mode [ 966.213853][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.257658][ T28] device bridge_slave_0 left promiscuous mode [ 966.263986][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.007148][ T28] device hsr_slave_0 left promiscuous mode [ 967.046887][ T28] device hsr_slave_1 left promiscuous mode [ 967.133277][ T28] team0 (unregistering): Port device team_slave_1 removed [ 967.143507][ T28] team0 (unregistering): Port device team_slave_0 removed [ 967.153596][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 967.180682][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 967.259087][ T28] bond0 (unregistering): Released all slaves 04:50:22 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:22 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 04:50:22 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r3 = syz_open_dev$dmmidi(0x0, 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000340)={0x5, 0x0, 0x6, 0x283}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x1, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, 0x0) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r5, &(0x7f0000000680)=[{&(0x7f0000000380)="9c2389e981efe1cbf48e197b1a951682e395515be8510206000000b08682add8e3a21204e296c5663c2f50435e6226295dca8cfe5a62fc935c00000000", 0x3d}, {&(0x7f0000000400)="8366c338a967d698", 0x8}, {0x0}, {&(0x7f0000000540)="0c1b4a941085651e308f0f5ca91113506b1ca841c1b0a422f4b39729c1212ab71474e646efe1d6c99647c2ecf6c984cabe439efa33ffdaa6b022a1ad3ce0ad1203113ed515c957bc7e3d007a715d76f7f2d41203bec9927d09bc46396c15e15dc1bd6234e6a756278735f716012f8b0990609d94a770434fd08209e64e502f24d4fbbbe650b59172f15ebcbbf9df6fa1f3f11530d74bc6cce8c5d6958b5a4bb251569b4aea39ed6546ab39325d3d0c6b06499c6e89f30f0867cf24781c45a66d4cf0926afbfa8ed44eaca8c3b6067c87700ba2f815f053a14c76c280c24dfc10eb8fd0", 0xe3}, {&(0x7f0000000640)="07188c657cf3e5f0e08bd019a18d0a5cfa12179531da08727a4acf2302e83283ff", 0x21}], 0x5, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 04:50:22 executing program 4: socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) timer_delete(0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24000058) pwritev(r1, &(0x7f0000000840)=[{&(0x7f00000001c0)}, {&(0x7f0000000380)="8e809d6b41ef41412d409c4f9fc37df1b9193de074aff482a72bff2147e8a9105b9edbd7111d4e45122ccb85f25b449bae4ec7ae784cc92411353523c43bef971eb112b85833f7bda615d08d7cdbb2dec20b88a12752fd7f127a516c31eb9dbd6764dac316ee4a12777852b6cacda7d24dd1224c8e7f5724a0e12ab3373b23b8f872e18bf1df7b80ba4d9eb2fdd54306ec4574cb453bf2ef0d5424f36765e1b7820b53be764ff1032fc6606fea285993733cc7e348ff02dfef9e2ee360b217fc08b7ac216f0efe0c3cc32e142dd75f25fe625e2566317307e5d4f36776ae271b392c4931f27b2e964caa42289c5bd74bc99ab7bef9068d", 0xf7}, {&(0x7f0000000640)="72677fd1763d435c7bb78c4c5bbb39e22dd308aa6e81735a4e561acf391bec8498363494e1561298cf61d4b017570309a66bbdc31d5004ff8d292b38daa626e0c0721848237932569a2ae9a3726b7874b49141334cf4ab306eb74f432038130c691691c3f33460994b0d1dd39728cc316dbf36e149d87c44efb958b200a12c3f26a30679198c1d8b05d9eb98c4474ec65bf415e997535ecfef47494ca278ef793f13f94331358bead0c37bcef49da1ac926edcaaeb611237eebf84bf57fca117bde9058eea53b6bb8a88b3b9fba59f6a03fc6b093ebc881aa8a8146ace1b49603ae70a3fcafa5c0290e3e478b711", 0xee}, {&(0x7f0000000480)="60fcc574481a385f8ad50446f80fe6c85b35c6f4e4e17ece239c588db8a670657e634eff113b3c7f6f3577c574fe83e9c314475d9cab8bf8b640d884d5914c2a7efcccbbf2b90f1d5cbd83558d957189bd1dae60dc2a5deb47f06ac5b40937b8b725d1e549a5375b4fe557f6829ffaeb6d81b82bda74499cb0a690844e78b05b08d90eb4ad4d9e79bfbd12553e53cc53b5a7e0f1a476581b00", 0x99}, {&(0x7f0000000740)="12cdf7c519ff4b14c7dbe5397d26b4bdd67c83e91f2f0480b6047188477a4109498ebf07bceeac21f341148cf816794e0618f318c359796852c6ecfa05aecfd2cf75f3ce87b7ad603824d80819080ade9c86ca1e3a378fc2362f69a6998790ea8869e81238bc4e45b640d0ced51ed668c46610e901c6dd7df6536ef6d6d9c70775be7056b2848e5a6720a86117229e387c57d453c5317b4a08c9e85eef7d348301382d98169a746c5bfe0ab05ee7b4df69aa84b3a12c24e8f41f03400fd7eb1aa138d89a2619f5f92a77e21ce44e7e7d97a27b9e38889b0f29a521efe79c40123064cccef318f03a9e35c29fb67fdfab71d211e7909cba65", 0xf8}], 0x5, 0x5) ioctl$LOOP_CLR_FD(r0, 0x4c01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r2) readahead(r2, 0xe43, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 04:50:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:50:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x1, 0x0) ioctl(r7, 0x80000000008936, &(0x7f0000000000)) sendmsg$NET_DM_CMD_STOP(r7, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) socket$inet6_tcp(0xa, 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) [ 969.039889][T14863] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:50:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) timer_delete(0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000058) pwritev(r1, &(0x7f0000000840)=[{&(0x7f00000001c0)}, {&(0x7f0000000380)="8e809d6b41ef41412d409c4f9fc37df1b9193de074aff482a72bff2147e8a9105b9edbd7111d4e45122ccb85f25b449bae4ec7ae784cc92411353523c43bef971eb112b85833f7bda615d08d7cdbb2dec20b88a12752fd7f127a516c31eb9dbd6764dac316ee4a12777852b6cacda7d24dd1224c8e7f5724a0e12ab3373b23b8f872e18bf1df7b80ba4d9eb2fdd54306ec4574cb453bf2ef0d5424f36765e1b7820b53be764ff1032fc6606fea285993733cc7e348ff02dfef9e2ee360b217fc08b7ac216f0efe0c3cc32e142dd75f25fe625e2566317307e5d4f36776ae271b392c4931f27b2e964caa42289c5bd74bc99ab7bef9068d", 0xf7}, {&(0x7f0000000640)="72677fd1763d435c7bb78c4c5bbb39e22dd308aa6e81735a4e561acf391bec8498363494e1561298cf61d4b017570309a66bbdc31d5004ff8d292b38daa626e0c0721848237932569a2ae9a3726b7874b49141334cf4ab306eb74f432038130c691691c3f33460994b0d1dd39728cc316dbf36e149d87c44efb958b200a12c3f26a30679198c1d8b05d9eb98c4474ec65bf415e997535ecfef47494ca278ef793f13f94331358bead0c37bcef49da1ac926edcaaeb611237eebf84bf57fca117bde9058eea53b6bb8a88b3b9fba59f6a03fc6b093ebc881aa8a8146ace1b49603ae70a3fcafa5c0290e3e478b711", 0xee}, {&(0x7f0000000480)="60fcc574481a385f8ad50446f80fe6c85b35c6f4e4e17ece239c588db8a670657e634eff113b3c7f6f3577c574fe83e9c314475d9cab8bf8b640d884d5914c2a7efcccbbf2b90f1d5cbd83558d957189bd1dae60dc2a5deb47f06ac5b40937b8b725d1e549a5375b4fe557f6829ffaeb6d81b82bda74499cb0a690844e78b05b08d90eb4ad4d9e79bfbd12553e53cc53b5a7e0f1a476581b00", 0x99}, {&(0x7f0000000740)="12cdf7c519ff4b14c7dbe5397d26b4bdd67c83e91f2f0480b6047188477a4109498ebf07bceeac21f341148cf816794e0618f318c359796852c6ecfa05aecfd2cf75f3ce87b7ad603824d80819080ade9c86ca1e3a378fc2362f69a6998790ea8869e81238bc4e45b640d0ced51ed668c46610e901c6dd7df6536ef6d6d9c70775be7056b2848e5a6720a86117229e387c57d453c5317b4a08c9e85eef7d348301382d98169a746c5bfe0ab05ee7b4df69aa84b3a12c24e8f41f03400fd7eb1aa138d89a2619f5f92a77e21ce44e7e7d97a27b9e38889b0f29a521efe79c40123064cccef318f03a9e35c29fb67fdfab71d211e7909cba65", 0xf8}], 0x5, 0x5) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001a, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) readahead(r3, 0xe43, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000001600)={0x7}, 0x7) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 04:50:22 executing program 0: 04:50:22 executing program 0: 04:50:22 executing program 4: 04:50:22 executing program 0: 04:50:22 executing program 4: [ 971.093239][T14895] IPVS: ftp: loaded support on port[0] = 21 [ 971.144949][T14895] chnl_net:caif_netlink_parms(): no params data found [ 971.171497][T14895] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.178619][T14895] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.186188][T14895] device bridge_slave_0 entered promiscuous mode [ 971.193703][T14895] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.200948][T14895] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.209196][T14895] device bridge_slave_1 entered promiscuous mode [ 971.226133][T14895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 971.236333][T14895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 971.255092][T14895] team0: Port device team_slave_0 added [ 971.261518][T14895] team0: Port device team_slave_1 added [ 971.319456][T14895] device hsr_slave_0 entered promiscuous mode [ 971.357222][T14895] device hsr_slave_1 entered promiscuous mode [ 971.403980][T14895] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.411074][T14895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 971.418429][T14895] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.425470][T14895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 971.469557][T14895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.482383][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 971.495160][ T8137] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.503660][ T8137] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.517371][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 971.529615][T14895] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.542187][T14898] IPVS: ftp: loaded support on port[0] = 21 [ 971.554274][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 971.563128][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.570289][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 971.589751][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 971.598331][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.605347][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 971.639449][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 971.648372][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 971.664822][T14895] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 971.675453][T14895] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 971.691870][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 971.700724][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 971.709499][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 971.725602][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 971.733253][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 971.741098][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 971.772111][T14898] chnl_net:caif_netlink_parms(): no params data found [ 971.794836][T14895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 971.813585][T14898] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.820841][T14898] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.828953][T14898] device bridge_slave_0 entered promiscuous mode [ 971.836549][T14898] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.844197][T14898] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.852733][T14898] device bridge_slave_1 entered promiscuous mode [ 971.871582][T14898] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 971.881937][T14898] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 971.901151][T14898] team0: Port device team_slave_0 added [ 971.908427][T14898] team0: Port device team_slave_1 added [ 971.969174][T14898] device hsr_slave_0 entered promiscuous mode [ 972.007461][T14898] device hsr_slave_1 entered promiscuous mode [ 972.047120][T14898] debugfs: Directory 'hsr0' with parent '/' already present! [ 972.058790][T14908] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 972.070105][T14908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 972.077845][T14908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 972.101861][T14898] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.109008][T14898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 972.116397][T14898] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.123464][T14898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.355903][T14906] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.363202][T14906] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.605228][ T8520] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.613273][ T8520] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.658384][T14898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 974.670831][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 974.684858][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 974.695058][T14898] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.710483][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 974.723702][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 974.732429][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.739497][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.757505][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 974.766163][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 974.774942][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.782059][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.790758][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 974.799628][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 974.808720][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 974.817538][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.826389][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 974.835169][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 974.843912][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 974.857884][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 974.866296][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 974.880072][T14898] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 974.891783][T14898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 974.899796][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 974.908451][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 974.927335][T14898] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 974.935563][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 974.943366][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 975.467641][T14768] device bridge_slave_1 left promiscuous mode [ 975.473964][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.517329][T14768] device bridge_slave_0 left promiscuous mode [ 975.523562][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.627615][T14768] device hsr_slave_0 left promiscuous mode [ 975.667035][T14768] device hsr_slave_1 left promiscuous mode [ 975.714463][T14768] team0 (unregistering): Port device team_slave_1 removed [ 975.725270][T14768] team0 (unregistering): Port device team_slave_0 removed [ 975.735597][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 975.791585][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 975.868486][T14768] bond0 (unregistering): Released all slaves [ 977.817680][T14768] device bridge_slave_1 left promiscuous mode [ 977.823996][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 977.877748][T14768] device bridge_slave_0 left promiscuous mode [ 977.884076][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.577058][T14768] device hsr_slave_0 left promiscuous mode [ 978.627039][T14768] device hsr_slave_1 left promiscuous mode [ 978.692675][T14768] team0 (unregistering): Port device team_slave_1 removed [ 978.703138][T14768] team0 (unregistering): Port device team_slave_0 removed [ 978.713199][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 978.760062][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 978.838280][T14768] bond0 (unregistering): Released all slaves [ 979.337776][T14921] bond0: (slave bond_slave_1): Releasing backup interface 04:50:32 executing program 5: 04:50:32 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:32 executing program 4: 04:50:32 executing program 0: 04:50:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r6, 0x0, 0x0) keyctl$assume_authority(0x10, r6) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r7 = socket(0xa, 0x1, 0x0) ioctl(r7, 0x80000000008936, &(0x7f0000000000)) sendmsg$NET_DM_CMD_STOP(r7, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) socket$inet6_tcp(0xa, 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) 04:50:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:50:33 executing program 0: 04:50:33 executing program 4: 04:50:33 executing program 4: 04:50:33 executing program 0: 04:50:33 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x0, 0x16f1}, 0x8) sendmmsg$alg(r1, &(0x7f0000002b00), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000), 0x8) 04:50:33 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7545c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) [ 981.883277][T14951] IPVS: ftp: loaded support on port[0] = 21 [ 981.943763][T14951] chnl_net:caif_netlink_parms(): no params data found [ 981.970621][T14951] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.978079][T14951] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.985796][T14951] device bridge_slave_0 entered promiscuous mode [ 981.993119][T14951] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.000224][T14951] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.008304][T14951] device bridge_slave_1 entered promiscuous mode [ 982.025190][T14951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 982.035678][T14951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 982.054914][T14951] team0: Port device team_slave_0 added [ 982.061585][T14951] team0: Port device team_slave_1 added [ 982.139513][T14951] device hsr_slave_0 entered promiscuous mode [ 982.197277][T14951] device hsr_slave_1 entered promiscuous mode [ 982.264412][T14951] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.271508][T14951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.279032][T14951] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.286081][T14951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.323370][T14951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.335724][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 982.345036][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.357658][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.371674][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 982.384918][T14951] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.391703][T14954] IPVS: ftp: loaded support on port[0] = 21 [ 982.398590][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.409802][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.417022][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.449898][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 982.458386][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.465423][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.483406][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 982.492138][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 982.506177][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 982.529294][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 982.563462][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 982.577455][T14954] chnl_net:caif_netlink_parms(): no params data found [ 982.587258][T14951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 982.617703][T14954] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.625036][T14954] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.633058][T14954] device bridge_slave_0 entered promiscuous mode [ 982.642157][T14954] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.649249][T14954] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.657052][T14954] device bridge_slave_1 entered promiscuous mode [ 982.678354][T14954] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 982.689650][T14954] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 982.710596][T14954] team0: Port device team_slave_0 added [ 982.720840][T14954] team0: Port device team_slave_1 added [ 982.728206][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 982.735582][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 982.799476][T14954] device hsr_slave_0 entered promiscuous mode [ 982.837251][T14954] device hsr_slave_1 entered promiscuous mode [ 982.876851][T14954] debugfs: Directory 'hsr0' with parent '/' already present! [ 982.888033][T14951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 982.901311][T14954] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.908435][T14954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.943363][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.956623][T14954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.969005][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 982.980031][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 982.990303][T14954] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.000273][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 983.008949][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 983.017552][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.024574][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 983.039081][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 983.047804][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 983.056411][ T8137] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.063493][ T8137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 983.083957][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 983.093274][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 983.113407][T14954] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 983.123953][T14954] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 983.141895][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 983.151200][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 983.160556][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 983.169757][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 983.179049][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 983.188065][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 983.197058][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 983.205468][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 983.214383][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 983.223159][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 983.269586][T14962] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 983.299362][T14962] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 983.310908][T14962] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 984.131882][T14965] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.139232][T14965] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.393141][T14954] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 985.416080][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 985.424079][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 986.307751][ T28] device bridge_slave_1 left promiscuous mode [ 986.314034][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 986.367501][ T28] device bridge_slave_0 left promiscuous mode [ 986.373792][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 986.487181][ T28] device hsr_slave_0 left promiscuous mode [ 986.546955][ T28] device hsr_slave_1 left promiscuous mode [ 986.594764][ T28] team0 (unregistering): Port device team_slave_1 removed [ 986.605556][ T28] team0 (unregistering): Port device team_slave_0 removed [ 986.617019][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 986.670766][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 986.749474][ T28] bond0 (unregistering): Released all slaves 04:50:41 executing program 5: r0 = socket(0x0, 0x0, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102", 0x23}], 0x1) unshare(0x40000000) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:50:41 executing program 0: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, 0x0) 04:50:41 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:41 executing program 4: socket$inet6(0xa, 0x8000000000080001, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x225, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x14002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa96a, 0x0, @perf_config_ext={0x81, 0x1}, 0x0, 0x0, 0x0, 0x467719920fad4012}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0}) 04:50:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000040), 0xffc0, 0x0, 0x0, 0xffffffffffffffbf) 04:50:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 988.069322][T14983] md: could not open unknown-block(0,0). [ 988.110422][T14983] md: md_import_device returned -6 [ 988.140485][T14981] IPVS: ftp: loaded support on port[0] = 21 04:50:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) readv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/155, 0x9b}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 04:50:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) readv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/155, 0x9b}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 04:50:42 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001680)=ANY=[@ANYBLOB="6664ddf98a270fbda3ffb0b39615b96d3915516a052eae5af971"]) [ 988.894695][T14987] IPVS: ftp: loaded support on port[0] = 21 [ 988.978416][T15006] fuse: Unknown parameter 'fdÝùŠ'½£ÿ°³–¹m9Qj.®Zùq' [ 988.992256][T15007] fuse: Unknown parameter 'fdÝùŠ'½£ÿ°³–¹m9Qj.®Zùq' 04:50:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="2b0400000000000000000100000000000000014100000018001700000000000000006574683a6309006630000000"], 0x33fe0}}, 0x0) 04:50:42 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 989.283834][T15012] Enabling of bearer rejected, failed to enable media [ 989.356342][T15014] Enabling of bearer rejected, failed to enable media 04:50:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000100)={0x6000, &(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x2}) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000740)=ANY=[], &(0x7f000095dffc)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)={0x0, 0x2}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) dup(0xffffffffffffffff) dup(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f00000010c0)=0x19ff, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/20, 0x14}], 0x1}, 0x2}, {{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/157, 0x9d}, 0x1}], 0x2, 0x40002002, 0x0) [ 989.567729][ T28] device bridge_slave_1 left promiscuous mode [ 989.577434][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.650524][ T28] device bridge_slave_0 left promiscuous mode [ 989.669866][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.236988][ T28] device hsr_slave_0 left promiscuous mode [ 991.276876][ T28] device hsr_slave_1 left promiscuous mode [ 991.324172][ T28] team0 (unregistering): Port device team_slave_1 removed [ 991.334608][ T28] team0 (unregistering): Port device team_slave_0 removed [ 991.346512][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 991.381394][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 991.460886][ T28] bond0 (unregistering): Released all slaves [ 991.547373][T15023] IPVS: ftp: loaded support on port[0] = 21 [ 991.611187][T15023] chnl_net:caif_netlink_parms(): no params data found [ 991.637964][T15023] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.645245][T15023] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.654788][T15023] device bridge_slave_0 entered promiscuous mode [ 991.662886][T15023] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.670158][T15023] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.678382][T15023] device bridge_slave_1 entered promiscuous mode [ 991.748656][T15023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 991.771523][T15023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 991.808207][T15023] team0: Port device team_slave_0 added [ 991.815270][T15023] team0: Port device team_slave_1 added [ 991.879177][T15023] device hsr_slave_0 entered promiscuous mode [ 991.917457][T15023] device hsr_slave_1 entered promiscuous mode [ 991.964082][T15023] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.971176][T15023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.978504][T15023] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.985537][T15023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.083132][T15027] IPVS: ftp: loaded support on port[0] = 21 [ 992.125386][T15023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 992.174205][T15023] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.182653][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 992.208281][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.226985][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.277652][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.286193][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.293344][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.322707][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.347732][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.355216][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.411775][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 992.420823][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 992.430511][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.439082][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.468168][T15023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 992.480384][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 992.523238][T15023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 992.542601][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 992.554165][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 992.588969][T15027] chnl_net:caif_netlink_parms(): no params data found [ 992.654300][T15027] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.664528][T15027] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.674567][T15027] device bridge_slave_0 entered promiscuous mode [ 992.693059][T15027] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.706686][T15027] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.716717][T15027] device bridge_slave_1 entered promiscuous mode [ 992.767992][T15027] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 992.808653][T15027] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 992.858486][T15027] team0: Port device team_slave_0 added [ 992.865701][T15027] team0: Port device team_slave_1 added [ 992.930876][T15027] device hsr_slave_0 entered promiscuous mode [ 992.987318][T15027] device hsr_slave_1 entered promiscuous mode [ 993.026955][T15027] debugfs: Directory 'hsr0' with parent '/' already present! [ 993.042815][T15027] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.049900][T15027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 993.057246][T15027] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.064338][T15027] bridge0: port 1(bridge_slave_0) entered forwarding state 04:50:46 executing program 5: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2, 0x14, 0x23}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x23}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 993.206032][T15027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 993.229441][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 993.238181][T12733] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.252725][T12733] bridge0: port 2(bridge_slave_1) entered disabled state [ 993.262086][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 993.279823][T15027] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.292046][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 993.303539][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.310690][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 993.324241][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 993.347172][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state 04:50:46 executing program 0: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, 0x0) 04:50:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:50:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000100)={0x6000, &(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x2}) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000740)=ANY=[], &(0x7f000095dffc)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)={0x0, 0x2}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) dup(0xffffffffffffffff) dup(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f00000010c0)=0x19ff, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/20, 0x14}], 0x1}, 0x2}, {{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/157, 0x9d}, 0x1}], 0x2, 0x40002002, 0x0) [ 993.354228][ T7904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 993.423765][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 993.439108][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 993.514008][T15044] IPVS: ftp: loaded support on port[0] = 21 [ 993.673765][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 993.833238][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 993.851176][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 993.896751][T15027] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 993.914043][T15027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 994.020503][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 994.032480][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 994.132856][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 994.149928][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 994.220791][T15027] 8021q: adding VLAN 0 to HW filter on device batadv0 04:50:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 04:50:47 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) syz_open_dev$midi(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f000095dffc)=0x1) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100), 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="b0", 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002002, 0x0) 04:50:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) [ 994.932303][ T28] device bridge_slave_1 left promiscuous mode [ 994.944179][ T28] bridge0: port 2(bridge_slave_1) entered disabled state 04:50:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:48 executing program 4: select(0x0, 0x0, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x1ff}, &(0x7f00000001c0)={0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 995.037073][ T28] device bridge_slave_0 left promiscuous mode [ 995.043338][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 04:50:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:50:48 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 995.466701][T15088] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 996.237150][ T28] device hsr_slave_0 left promiscuous mode [ 996.276933][ T28] device hsr_slave_1 left promiscuous mode [ 996.343430][ T28] team0 (unregistering): Port device team_slave_1 removed [ 996.353997][ T28] team0 (unregistering): Port device team_slave_0 removed [ 996.364016][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 996.420389][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 996.510660][ T28] bond0 (unregistering): Released all slaves [ 996.613484][T15092] IPVS: ftp: loaded support on port[0] = 21 [ 996.763156][T15092] chnl_net:caif_netlink_parms(): no params data found [ 996.803514][T15092] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.811305][T15092] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.823108][T15092] device bridge_slave_0 entered promiscuous mode [ 996.831224][T15092] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.842382][T15092] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.850953][T15092] device bridge_slave_1 entered promiscuous mode [ 996.876246][T15092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 996.891271][T15092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 996.918744][T15092] team0: Port device team_slave_0 added [ 996.977944][T15092] team0: Port device team_slave_1 added [ 997.073477][T15092] device hsr_slave_0 entered promiscuous mode [ 997.127207][T15092] device hsr_slave_1 entered promiscuous mode [ 997.192762][T15092] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.200058][T15092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.207472][T15092] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.214507][T15092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.257918][T15092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 997.277899][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 997.286564][T12733] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.313149][T12733] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.328199][T15092] 8021q: adding VLAN 0 to HW filter on device team0 [ 997.344572][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 997.356172][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.363253][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.392665][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 997.404052][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.411141][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.425584][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 997.443035][T15092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 997.458537][T15092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 997.492318][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 997.502516][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 997.530786][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 997.546434][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 997.579832][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 997.597175][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 997.604581][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 997.615297][T15092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 998.927323][ T7921] device bridge_slave_1 left promiscuous mode [ 998.933665][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.997607][ T7921] device bridge_slave_0 left promiscuous mode [ 999.003818][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.717037][ T7921] device hsr_slave_0 left promiscuous mode [ 999.786959][ T7921] device hsr_slave_1 left promiscuous mode [ 999.843613][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 999.854159][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 999.865607][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 999.921057][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 999.980441][ T7921] bond0 (unregistering): Released all slaves 04:50:58 executing program 5: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2, 0x14, 0x23}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x23}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:58 executing program 2: r0 = eventfd(0x0) r1 = eventfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000080)={r1}) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000100)={r1, 0x0, 0x2, r0}) 04:50:58 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:50:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:50:58 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000006"]) 04:50:58 executing program 4: select(0x0, 0x0, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x1ff}, &(0x7f00000001c0)={0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 04:50:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) gettid() r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dfb, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 04:50:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 04:50:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) gettid() r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dfb, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 04:50:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x6000000, 0x100000001, 0x6000000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:50:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4400ae8f, &(0x7f0000000140)) dup2(r3, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:50:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) [ 1005.786820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1005.792645][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.314275][T15177] IPVS: ftp: loaded support on port[0] = 21 [ 1007.368852][T15177] chnl_net:caif_netlink_parms(): no params data found [ 1007.396210][T15177] bridge0: port 1(bridge_slave_0) entered blocking state [ 1007.403435][T15177] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.411506][T15177] device bridge_slave_0 entered promiscuous mode [ 1007.418829][T15177] bridge0: port 2(bridge_slave_1) entered blocking state [ 1007.426016][T15177] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.434041][T15177] device bridge_slave_1 entered promiscuous mode [ 1007.452996][T15177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1007.463865][T15177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1007.483343][T15177] team0: Port device team_slave_0 added [ 1007.490147][T15177] team0: Port device team_slave_1 added [ 1007.559461][T15177] device hsr_slave_0 entered promiscuous mode [ 1007.597174][T15177] device hsr_slave_1 entered promiscuous mode [ 1007.643349][T15177] bridge0: port 2(bridge_slave_1) entered blocking state [ 1007.650432][T15177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1007.657754][T15177] bridge0: port 1(bridge_slave_0) entered blocking state [ 1007.664967][T15177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1007.697386][T15177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1007.709775][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1007.718075][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.725897][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.734865][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1007.747703][T15177] 8021q: adding VLAN 0 to HW filter on device team0 [ 1007.758893][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1007.767591][T15108] bridge0: port 1(bridge_slave_0) entered blocking state [ 1007.774653][T15108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1007.785408][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1007.794356][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1007.801525][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1007.819812][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1007.829185][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1007.840800][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1007.855630][T15177] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1007.866384][T15177] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1007.879361][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1007.887924][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1007.900118][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1007.914432][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1007.922029][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1007.932351][T15177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1009.867952][T14768] device bridge_slave_1 left promiscuous mode [ 1009.874298][T14768] bridge0: port 2(bridge_slave_1) entered disabled state 04:51:03 executing program 5: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2, 0x14, 0x23}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x23}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:51:03 executing program 3: mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:03 executing program 4: 04:51:03 executing program 2: 04:51:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x6000000, 0x100000001, 0x6000000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:51:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1009.921839][T14768] device bridge_slave_0 left promiscuous mode [ 1009.928264][T14768] bridge0: port 1(bridge_slave_0) entered disabled state 04:51:03 executing program 4: 04:51:03 executing program 2: 04:51:03 executing program 3: mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:03 executing program 4: 04:51:03 executing program 2: 04:51:03 executing program 3: mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 1011.637336][T14768] device hsr_slave_0 left promiscuous mode [ 1011.716999][T14768] device hsr_slave_1 left promiscuous mode [ 1011.763234][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1011.774055][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1011.784794][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1011.821354][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1011.888878][T14768] bond0 (unregistering): Released all slaves [ 1012.363243][T15226] IPVS: ftp: loaded support on port[0] = 21 [ 1012.453546][T15226] chnl_net:caif_netlink_parms(): no params data found [ 1012.494776][T15226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.505556][T15226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.514154][T15226] device bridge_slave_0 entered promiscuous mode [ 1012.525429][T15226] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.533139][T15226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.542269][T15226] device bridge_slave_1 entered promiscuous mode [ 1012.568317][T15226] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1012.582233][T15226] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1012.602819][T15226] team0: Port device team_slave_0 added [ 1012.609612][T15226] team0: Port device team_slave_1 added [ 1012.684036][T15226] device hsr_slave_0 entered promiscuous mode [ 1012.737386][T15226] device hsr_slave_1 entered promiscuous mode [ 1012.813239][T15226] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.820767][T15226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1012.828061][T15226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.835123][T15226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1012.867882][T15226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1012.880964][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1012.889648][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.898061][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.910762][T15226] 8021q: adding VLAN 0 to HW filter on device team0 [ 1012.924819][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1012.933538][T15108] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.940720][T15108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1012.949379][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1012.957758][T15108] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.964784][T15108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1012.981865][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1012.990935][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1013.001200][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1013.011180][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1013.024013][T15226] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1013.037100][T15226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1013.048768][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1013.057768][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1013.066472][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1013.075163][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1013.084454][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1013.098115][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1013.105630][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1013.115836][T15226] 8021q: adding VLAN 0 to HW filter on device batadv0 04:51:08 executing program 5: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2, 0x14, 0x23}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x23}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:51:08 executing program 4: 04:51:08 executing program 2: 04:51:08 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:08 executing program 0: 04:51:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1015.097401][T14768] device bridge_slave_1 left promiscuous mode [ 1015.103636][T14768] bridge0: port 2(bridge_slave_1) entered disabled state 04:51:08 executing program 2: [ 1015.173040][T14768] device bridge_slave_0 left promiscuous mode [ 1015.180555][T14768] bridge0: port 1(bridge_slave_0) entered disabled state 04:51:08 executing program 4: 04:51:08 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:08 executing program 0: 04:51:08 executing program 4: 04:51:08 executing program 2: [ 1016.767125][T14768] device hsr_slave_0 left promiscuous mode [ 1016.806987][T14768] device hsr_slave_1 left promiscuous mode [ 1016.883699][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1016.895080][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1016.905314][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1016.961275][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1017.038499][T14768] bond0 (unregistering): Released all slaves [ 1017.456053][T15268] IPVS: ftp: loaded support on port[0] = 21 [ 1017.546563][T15268] chnl_net:caif_netlink_parms(): no params data found [ 1017.583992][T15268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.594454][T15268] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.603564][T15268] device bridge_slave_0 entered promiscuous mode [ 1017.614725][T15268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1017.622713][T15268] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.634644][T15268] device bridge_slave_1 entered promiscuous mode [ 1017.659663][T15268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1017.674827][T15268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1017.700163][T15268] team0: Port device team_slave_0 added [ 1017.707871][T15268] team0: Port device team_slave_1 added [ 1017.769932][T15268] device hsr_slave_0 entered promiscuous mode [ 1017.807204][T15268] device hsr_slave_1 entered promiscuous mode [ 1017.883088][T15268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1017.890163][T15268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1017.897575][T15268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.904844][T15268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1017.937419][T15268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1017.949976][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1017.959408][ T7885] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.968167][ T7885] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.982359][T15268] 8021q: adding VLAN 0 to HW filter on device team0 [ 1017.994160][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1018.007594][ T7885] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.014730][ T7885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1018.028828][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1018.037487][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.044571][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1018.066608][T15268] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1018.077487][T15268] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1018.091801][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1018.101063][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1018.109931][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1018.118766][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1018.127673][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1018.135259][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1018.152489][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1018.160520][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1018.170616][T15268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1020.157477][T14768] device bridge_slave_1 left promiscuous mode [ 1020.163647][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1020.217816][T14768] device bridge_slave_0 left promiscuous mode [ 1020.224108][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.927169][T14768] device hsr_slave_0 left promiscuous mode [ 1020.997361][T14768] device hsr_slave_1 left promiscuous mode [ 1021.073435][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1021.083278][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1021.093606][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1021.160465][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1021.238652][T14768] bond0 (unregistering): Released all slaves 04:51:17 executing program 5: 04:51:17 executing program 4: 04:51:17 executing program 2: 04:51:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:51:17 executing program 0: 04:51:18 executing program 4: setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x40046104, &(0x7f0000000280)={'syzkaller1\x00', {0x2, 0x0, @dev}}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:51:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 04:51:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) [ 1025.020097][T15307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.027407][T15307] bridge0: port 1(bridge_slave_0) entered disabled state 04:51:18 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 04:51:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 1027.038926][T15323] IPVS: ftp: loaded support on port[0] = 21 [ 1027.093544][T15323] chnl_net:caif_netlink_parms(): no params data found [ 1027.120121][T15323] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.127353][T15323] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.135066][T15323] device bridge_slave_0 entered promiscuous mode [ 1027.142500][T15323] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.150769][T15323] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.158594][T15323] device bridge_slave_1 entered promiscuous mode [ 1027.176128][T15323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1027.186550][T15323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1027.204906][T15323] team0: Port device team_slave_0 added [ 1027.212039][T15323] team0: Port device team_slave_1 added [ 1027.269459][T15323] device hsr_slave_0 entered promiscuous mode [ 1027.327166][T15323] device hsr_slave_1 entered promiscuous mode [ 1027.374293][T15323] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.381656][T15323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1027.388942][T15323] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.396146][T15323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1027.428929][T15323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1027.440400][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1027.449416][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.457400][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.466159][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1027.478052][T15323] 8021q: adding VLAN 0 to HW filter on device team0 [ 1027.489346][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1027.497793][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.504847][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1027.515330][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1027.524258][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.531316][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1027.550119][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1027.559413][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1027.568761][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1027.582746][T15323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1027.593456][T15323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1027.605765][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1027.615184][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1027.623878][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1027.640458][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1027.647901][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1027.660323][T15323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1029.577637][ T7921] device bridge_slave_1 left promiscuous mode [ 1029.583845][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.637660][ T7921] device bridge_slave_0 left promiscuous mode [ 1029.643835][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.377311][ T7921] device hsr_slave_0 left promiscuous mode [ 1030.457071][ T7921] device hsr_slave_1 left promiscuous mode [ 1030.514739][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 1030.525332][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 1030.536629][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1030.601337][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1030.689393][ T7921] bond0 (unregistering): Released all slaves 04:51:26 executing program 5: r0 = socket(0x1, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x3fe) 04:51:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 04:51:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 04:51:26 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:26 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040), 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x105) pwritev(r2, &(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r2, 0x0) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x2) recvfrom$inet6(r2, &(0x7f0000000100)=""/64, 0x40, 0x800, &(0x7f0000000140)={0x18, 0x2, 0x403}, 0xc) r3 = socket(0x2, 0x1, 0x0) connect$unix(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="6a8bc9634e19767b0784"], 0x10) sendto$inet6(r3, &(0x7f0000000300)="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", 0x189, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = accept$unix(r1, 0x0, 0x0) write(r4, &(0x7f0000000240)="ddee43ab8734abe72e8289e48f848dcae6855abde176689fd16e6ad78a4f273bc1d2e3f3f911c89a2472d11399504870b9fb0e36d8892e80897800000000d20a2c82125431700f50a6b8d22db0ec0ff3a1800280b535084f92a7499cd07afbd1d0b82c439984f338ffbf66decf2ba302619dc2dcef33b15aa3d89beb2b70ddbd84311f09a2639749e5f4c3669169eb4be5a922395a28149f4d2ec0588916c297ac43adfbb5775ab949938e2baef7e6fa3703487dc7cd0255926c0ec9", 0xfffffea5) sendto(r3, &(0x7f0000000080)="0b34194e9ea0d080fda1ae4cb1f011", 0xf, 0x2, &(0x7f00000000c0)=@in={0x2, 0x2}, 0xc) execve(0x0, 0x0, 0x0) dup2(r1, r4) 04:51:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:51:26 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040), 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x105) pwritev(r2, &(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r2, 0x0) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x2) recvfrom$inet6(r2, &(0x7f0000000100)=""/64, 0x40, 0x800, &(0x7f0000000140)={0x18, 0x2, 0x403}, 0xc) r3 = socket(0x2, 0x1, 0x0) connect$unix(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="6a8bc9634e19767b0784"], 0x10) sendto$inet6(r3, &(0x7f0000000300)="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", 0x189, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = accept$unix(r1, 0x0, 0x0) write(r4, &(0x7f0000000240)="ddee43ab8734abe72e8289e48f848dcae6855abde176689fd16e6ad78a4f273bc1d2e3f3f911c89a2472d11399504870b9fb0e36d8892e80897800000000d20a2c82125431700f50a6b8d22db0ec0ff3a1800280b535084f92a7499cd07afbd1d0b82c439984f338ffbf66decf2ba302619dc2dcef33b15aa3d89beb2b70ddbd84311f09a2639749e5f4c3669169eb4be5a922395a28149f4d2ec0588916c297ac43adfbb5775ab949938e2baef7e6fa3703487dc7cd0255926c0ec9", 0xfffffea5) sendto(r3, &(0x7f0000000080)="0b34194e9ea0d080fda1ae4cb1f011", 0xf, 0x2, &(0x7f00000000c0)=@in={0x2, 0x2}, 0xc) execve(0x0, 0x0, 0x0) dup2(r1, r4) 04:51:26 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c69002300b6674c28838e4a81000000000000010000f35910074a0000000dfe80000006000000000000e89ce6a200f90000bb400000000000006bcad0964e69f9efa500000000000000092ad8a58202df5af7b06e09b7d94c0d0a432f7c6f0a65519254231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9f81d6d209538f3afac20dd72afabf79b342189fe6c8cc17a61bb664e501cb6a98038fde00000000eae0247d92dfde8b0da6bb67c20340d76e98d336d8f16552b2846f124e2bdd477ab5e5f1037c6806d472aa5af9e99e"], 0x1) sendmmsg(r0, &(0x7f00000003c0), 0x0, 0x2) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c69002300b6674c28838e4a81000000000000010000f35910074a0000000dfe80000006000000000000e89ce6a200f90000bb400000000000006bcad0964e69f9efa5c7cea88b044343f72ad8a58202df5af7b06e09b7d94c0d0a432f7c6f0a65519254231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9f81d6d209538f3abc6f0dd72afabf79b342189fe6c8cc17a61bb664e501cb6a98038fde00000000eae0247d92dfde8b0da6bb67c20340d76e98d336d8f16552b2846f124e2bdd477ab5e5f1067f85020060ba03f9e99e507397cfaea9fafabf016288de11ec3589e1a0f55778aa90b6360bc0a991a247841c84a86fda851f1349e170f56459fa25c4cef17ee95ec903d8b9ffdc21a18b2896f0fb278349cd1ed02c58f8436b56101eef6b7ac3dd716ecf477803499b1ecf8fa968"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, 0x0, 0x800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f00000003c0)='./bus\x00', 0xa840, 0x2) r5 = dup(r3) sendto$inet(r5, &(0x7f0000000cc0)="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", 0x25e, 0x4804, 0x0, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6(0xa, 0x3, 0x2) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x400000400080803, 0x0) r12 = dup(r11) write$cgroup_int(r12, 0x0, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r13, 0x0, r14) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, r15}) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r15}) getsockopt$IP_VS_SO_GET_SERVICES(r9, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r8, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r16 = socket$packet(0x11, 0x3, 0x300) shutdown(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r16) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 04:51:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 04:51:26 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 04:51:27 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') [ 1033.866829][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.872653][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.876813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.884154][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.946813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.952633][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1034.026846][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1034.032688][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1035.698774][T15386] IPVS: ftp: loaded support on port[0] = 21 [ 1035.755925][T15386] chnl_net:caif_netlink_parms(): no params data found [ 1035.782555][T15386] bridge0: port 1(bridge_slave_0) entered blocking state [ 1035.789814][T15386] bridge0: port 1(bridge_slave_0) entered disabled state [ 1035.797683][T15386] device bridge_slave_0 entered promiscuous mode [ 1035.805409][T15386] bridge0: port 2(bridge_slave_1) entered blocking state [ 1035.812502][T15386] bridge0: port 2(bridge_slave_1) entered disabled state [ 1035.820353][T15386] device bridge_slave_1 entered promiscuous mode [ 1035.837465][T15386] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1035.848398][T15386] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1035.866240][T15386] team0: Port device team_slave_0 added [ 1035.873024][T15386] team0: Port device team_slave_1 added [ 1035.929403][T15386] device hsr_slave_0 entered promiscuous mode [ 1035.967329][T15386] device hsr_slave_1 entered promiscuous mode [ 1036.014828][T15386] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.022086][T15386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1036.029379][T15386] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.036488][T15386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1036.068215][T15386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1036.079711][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1036.088854][T12733] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.096515][T12733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.105464][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1036.116987][T15386] 8021q: adding VLAN 0 to HW filter on device team0 [ 1036.130466][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1036.139067][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.146150][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1036.154281][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1036.163046][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.170351][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1036.189117][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1036.198653][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1036.212759][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1036.224467][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1036.236617][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1036.247448][T15386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1036.261933][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1036.269890][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1036.280626][T15386] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1038.207376][ T28] device bridge_slave_1 left promiscuous mode [ 1038.213789][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1038.277578][ T28] device bridge_slave_0 left promiscuous mode [ 1038.284124][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 1038.997165][ T28] device hsr_slave_0 left promiscuous mode [ 1039.067103][ T28] device hsr_slave_1 left promiscuous mode [ 1039.123221][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1039.134488][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1039.145222][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1039.181258][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1039.242944][ T28] bond0 (unregistering): Released all slaves 04:51:36 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) creat(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 04:51:36 executing program 5: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0xb1, 0x0, 0x0, 0x400}, {0x80000006}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x30005, 0x0) 04:51:36 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:51:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 04:51:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c69002300b6674c28838e4a81000000000000010000f35910074a0000000dfe80000006000000000000e89ce6a200f90000bb400000000000006bcad0964e69f9efa500000000000000092ad8a58202df5af7b06e09b7d94c0d0a432f7c6f0a65519254231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9f81d6d209538f3afac20dd72afabf79b342189fe6c8cc17a61bb664e501cb6a98038fde00000000eae0247d92dfde8b0da6bb67c20340d76e98d336d8f16552b2846f124e2bdd477ab5e5f1037c6806d472aa5af9e99e"], 0x1) sendmmsg(r0, &(0x7f00000003c0), 0x0, 0x2) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, 0x0, 0x800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f00000003c0)='./bus\x00', 0xa840, 0x2) r5 = dup(r3) sendto$inet(r5, &(0x7f0000000cc0)="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", 0x25e, 0x4804, 0x0, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6(0xa, 0x3, 0x2) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x400000400080803, 0x0) r12 = dup(r11) write$cgroup_int(r12, 0x0, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r13, 0x0, r14) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, r15}) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r15}) getsockopt$IP_VS_SO_GET_SERVICES(r9, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r8, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r16 = socket$packet(0x11, 0x3, 0x300) shutdown(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r16) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1043.520194][ T25] audit: type=1804 audit(1573534296.832:40): pid=15409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir868395648/syzkaller.y9zzQH/153/memory.events" dev="sda1" ino=16564 res=1 04:51:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') [ 1044.078624][T15409] syz-executor.0 (15409) used greatest stack depth: 9952 bytes left 04:51:37 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) creat(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 04:51:37 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000, 0x0, 0x0, 0x60], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @rand_addr="bb467fbc264c2d96b2c55265e0114569"}}}}}}}, 0x0) [ 1044.266850][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1044.272694][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1044.276805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1044.284210][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:37 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000000000000000000c65336c1abe5b92f2f00000000000000000000000000000002000000000000da6e0856d62c"], 0x7c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1044.365332][ T25] audit: type=1804 audit(1573534297.672:41): pid=15425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir868395648/syzkaller.y9zzQH/154/memory.events" dev="sda1" ino=16662 res=1 04:51:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c69002300b6674c28838e4a81000000000000010000f35910074a0000000dfe80000006000000000000e89ce6a200f90000bb400000000000006bcad0964e69f9efa500000000000000092ad8a58202df5af7b06e09b7d94c0d0a432f7c6f0a65519254231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9f81d6d209538f3afac20dd72afabf79b342189fe6c8cc17a61bb664e501cb6a98038fde00000000eae0247d92dfde8b0da6bb67c20340d76e98d336d8f16552b2846f124e2bdd477ab5e5f1037c6806d472aa5af9e99e"], 0x1) sendmmsg(r0, &(0x7f00000003c0), 0x0, 0x2) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, 0x0, 0x800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f00000003c0)='./bus\x00', 0xa840, 0x2) r5 = dup(r3) sendto$inet(r5, &(0x7f0000000cc0)="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", 0x25e, 0x4804, 0x0, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6(0xa, 0x3, 0x2) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x400000400080803, 0x0) r12 = dup(r11) write$cgroup_int(r12, 0x0, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r13, 0x0, r14) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, r15}) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r15}) getsockopt$IP_VS_SO_GET_SERVICES(r9, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r8, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r16 = socket$packet(0x11, 0x3, 0x300) shutdown(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r16) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 04:51:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) close(r0) 04:51:38 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 1045.072766][T15425] syz-executor.0 (15425) used greatest stack depth: 9824 bytes left [ 1045.306833][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1045.312667][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1046.214548][T15454] IPVS: ftp: loaded support on port[0] = 21 [ 1046.266667][T15454] chnl_net:caif_netlink_parms(): no params data found [ 1046.293782][T15454] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.301113][T15454] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.310400][T15454] device bridge_slave_0 entered promiscuous mode [ 1046.319023][T15454] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.326096][T15454] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.334036][T15454] device bridge_slave_1 entered promiscuous mode [ 1046.352690][T15454] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1046.364853][T15454] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1046.384649][T15454] team0: Port device team_slave_0 added [ 1046.391333][T15454] team0: Port device team_slave_1 added [ 1046.449762][T15454] device hsr_slave_0 entered promiscuous mode [ 1046.507274][T15454] device hsr_slave_1 entered promiscuous mode [ 1046.574195][T15454] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.581357][T15454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.588766][T15454] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.595798][T15454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.627737][T15454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1046.638933][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1046.648311][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.656404][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.665751][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1046.678085][T15454] 8021q: adding VLAN 0 to HW filter on device team0 [ 1046.688215][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1046.697225][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.704281][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.715291][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1046.724505][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.731840][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.750650][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1046.759712][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1046.771538][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1046.783867][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1046.798650][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1046.810324][T15454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1046.824313][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1046.832053][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1046.844038][T15454] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1048.797494][ T7921] device bridge_slave_1 left promiscuous mode [ 1048.803703][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.847472][ T7921] device bridge_slave_0 left promiscuous mode [ 1048.853711][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.577096][ T7921] device hsr_slave_0 left promiscuous mode [ 1049.627100][ T7921] device hsr_slave_1 left promiscuous mode [ 1049.683074][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 1049.693400][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 1049.703460][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1049.740518][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1049.820831][ T7921] bond0 (unregistering): Released all slaves [ 1050.506851][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.506874][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.512883][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.596880][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.602846][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.666874][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.672862][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1051.546875][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1051.556081][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1052.586870][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:51:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_SET_SREGS(r2, 0x4400ae8f, &(0x7f0000000140)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 04:51:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd9252689db19239e8a5606e6635ddee806b5f917ba77a9d73c005f1d65ab06dcefc57551c9d41fbc241e44552829a60768e93d001671f3effb1f1ef2ae12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e7275ab7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069c500000000000a6524126f1fdaf7dd82c4e83ecc7b60600f45e9602e1d2ea4470ece86713678f239e277019b632afc6e09aa720c7620b36940af961f0ccc095ef8ece8377b84cc3b9f26fcd4e9cdf9a941f3d3a1114b5cfa5432d36bbd84a3407c901385764a5697cbd02e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0a3134ec8b4977cdb1f95e90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cff07ffff2158bc5e7a51432573c5d5842504bd6ac17200535a53ff3b2c8f6d88eca4a2644ac91970d1ca2db0e6361a19e9606bdaa3892320d499b2a82743d51374c501d8d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e1053df88e5494f952d8fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7c56187514597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f6752cf5c30600eeff00000000de8ce0505e8ab69b19fa7067c68a0601eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae60800008000000000cb788992f654f201817a77dadb046bace09f06666bea92cb87abcd83c41b2db3b402174a7daaba729067ddb040ed96a4a533c600c8eb0042651150a50028bd8618e9f243728b129c4c0b52403edfa4ffa2aa53d4cc45703c0585a625f9e524"], 0x35b) setsockopt$sock_int(r0, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRESDEC, @ANYRES64, @ANYRESHEX], 0xffffffffffffffcc) 04:51:48 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000916, 0x4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0x1, 0x8000, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="db3f06f8ec83cf0324e87f454a9831056a4fa273d72477619e80d9ccbc0ad856350b03db35e5b64131f998f07834eb3bde2c4fb89d184bcdf26a5e06002b1e1bcb43b431c7cdd5050c9125b6072aafc1ad8c45eb70b0dd0a57aeab3dc53b235a317d17e00e495eb30a60e8d0122a207570edd060dfdfcb5f8dd9433f570c2b7d69ad7c167a897b7dc8467711d38902650c463d377af4508e9a12f48c249e141812ec6edcfdfd9657de6d2b729c39673e2d44aecb72f979edb1c74a8d2701ea82c7afc00bf0ab91b37863cad720a1220cc9ab1227719569e3a0ebc36de1e0e6aa1dacc54e9a5f1f206fe9e142773ce455f6183236fdd2b4449be23a3989488f2f4caa43533a09b6592ce208febbfb1c2ae455a3ef45736fafdc387eeff506254d9f9cc7381d9c15d6dcb93eff565281f34ce87a44d6c429fd6113cba4bea71692ec15ad99318affbb08217dd137565cfbdf3a942bd30903aa1162a466d8082cbff04c410c7f35c6b25ef209c9f4200df5a8df8632368876cc2c876f33595642ba50faf31f7894f8dff96f52f853c8d2d9c2f3a8faa01dc5f7305d91c64d0efda8b4af572ce47f21", @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="f364d959e080b125773818ac153bee79603f675fb842bc9f7cec1b43e044dfa34aae7ce70277eb17b97d66acb4bfd78b624ee32354746768eab624e026ba13d0494b91a86d548660e11805f33e20f08a4e1aaed0fd9510c887b24ff0faa9c5bacc59172bd560c6504f15d6706475cddfe9dbd36ce077279577d023ed8e875757133b743317135f7467caaec9d5525cb20563aaac6548e3b121c3", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="3e581d96bdbd718304a81120b2381918380e0362990fb6a5fe0d867b0c70503bb1e9c03485f38bc04b7de25070b879a23ef65e9a57c23f279f6326f96aaff8d20e4fd6e5987946f5410644efb02088ade1ff7f00005a8c1e800759544ecd5b1ad0f453947f52875a0a4975979defe2d36cf48b96b3f36cb0a3b196dddb959ac525617c172bd76f4e46e7b797c999fa6c9e2d8c73789caa0d41280987370ea50aa4cf16563afa02ab170a3019061cbda7af1610d24ee89a00000000", @ANYRES16, @ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYBLOB="64fa41a860d3d28b386118c85673a693cb673c799e6c950486de85604179197a4cfe1dcc4737c583dc7cc2f5a1af8fef10e7c6e4ab341ae60010000000b40500358b2b218db58a9ce3e7e1f319132ab8064224e3dc2b0c1d3e0d2c0508a2ec2ee743fbb33fad01fb0587eadd7c6dd1d985b324256c191b959b3b163cb72d21f018b403764034b8f7edd06d574d56b049ee700fd0e2a72b0699f75c566858526ae28fa63f9f41511bd5fa564dac534c4512bface3683f7756b9c82c56210f6d8c4d3802a93645b17620a5247ee0760000", @ANYRESOCT, @ANYPTR]], @ANYBLOB="b7e73a1d2edd3910dcaeab8c30d059d1eb1665345e000000000000800112130be48d7b1397f69b5aee61355b5ec6a8395a8c5a833203757d4fc84e4bf0b72b148861e32ca695734ab0abab5a26801fa1efd10f4b8737e3750602d2721607a8bb4bee07eb9528c12e1e70aa4855b07d989a8c48d11e4c6cafad2067d98fd2c165ef0fa928881fa85e9e023fd6bbb74bece396aa022590ef45c7f4666193d7531ad97c7a77fcece5b04214b12c00b972a44b0fe2fe2233d9fbf99667588930b3b36eb34d34d28fc93050e20e0a27e9032ed8f207747c7cf6c870de9d800e74131b04d3933f77f091980207359d67cfbbbce18c246bd082af616e", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC, @ANYBLOB="fdff24650a06d48c6bd1507ae657bb1f27296b74128d35d4f5c9b5d14860182811f702a8958b96836fe7e06a2991b69c692854cbf3e4b0cb77a8bfaf66ce76817c83392eb3df56f646c6788cc3b7a4", @ANYRESDEC, @ANYRES32=0x0], @ANYRESHEX], 0xffffff1d) 04:51:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c69002300b6674c28838e4a81000000000000010000f35910074a0000000dfe80000006000000000000e89ce6a200f90000bb400000000000006bcad0964e69f9efa500000000000000092ad8a58202df5af7b06e09b7d94c0d0a432f7c6f0a65519254231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9f81d6d209538f3afac20dd72afabf79b342189fe6c8cc17a61bb664e501cb6a98038fde00000000eae0247d92dfde8b0da6bb67c20340d76e98d336d8f16552b2846f124e2bdd477ab5e5f1037c6806d472aa5af9e99e"], 0x1) sendmmsg(r0, &(0x7f00000003c0), 0x0, 0x2) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, 0x0, 0x800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f00000003c0)='./bus\x00', 0xa840, 0x2) r5 = dup(r3) sendto$inet(r5, &(0x7f0000000cc0)="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", 0x25e, 0x4804, 0x0, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6(0xa, 0x3, 0x2) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x400000400080803, 0x0) r12 = dup(r11) write$cgroup_int(r12, 0x0, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r13, 0x0, r14) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, r15}) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r15}) getsockopt$IP_VS_SO_GET_SERVICES(r9, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r8, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r16 = socket$packet(0x11, 0x3, 0x300) shutdown(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r16) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 04:51:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:51:48 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:48 executing program 4: 04:51:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_SET_SREGS(r2, 0x4400ae8f, &(0x7f0000000140)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 04:51:48 executing program 4: 04:51:48 executing program 0: 04:51:49 executing program 0: [ 1055.706833][ C0] net_ratelimit: 17 callbacks suppressed [ 1055.706844][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1055.718339][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:51:49 executing program 4: 04:51:49 executing program 0: [ 1057.407014][T15509] IPVS: ftp: loaded support on port[0] = 21 [ 1057.473357][T15509] chnl_net:caif_netlink_parms(): no params data found [ 1057.499752][T15509] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.507015][T15509] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.514540][T15509] device bridge_slave_0 entered promiscuous mode [ 1057.521978][T15509] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.529123][T15509] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.537268][T15509] device bridge_slave_1 entered promiscuous mode [ 1057.553648][T15509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1057.564244][T15509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1057.583425][T15509] team0: Port device team_slave_0 added [ 1057.590063][T15509] team0: Port device team_slave_1 added [ 1057.639278][T15509] device hsr_slave_0 entered promiscuous mode [ 1057.677227][T15509] device hsr_slave_1 entered promiscuous mode [ 1057.733607][T15509] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.740809][T15509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.748296][T15509] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.755379][T15509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.787593][T15509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1057.799957][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1057.808501][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.816142][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.825048][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1057.836694][T15509] 8021q: adding VLAN 0 to HW filter on device team0 [ 1057.848025][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1057.856337][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.863430][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.874205][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1057.882993][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.890060][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.907797][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1057.916569][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1057.930706][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1057.943344][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1057.955632][T15509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1057.967629][T15509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1057.975941][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1057.991790][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1057.999464][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1058.013980][T15509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1059.967459][ T7936] device bridge_slave_1 left promiscuous mode [ 1059.973775][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.037543][ T7936] device bridge_slave_0 left promiscuous mode [ 1060.043752][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.752192][ T7936] device hsr_slave_0 left promiscuous mode [ 1060.806932][ T7936] device hsr_slave_1 left promiscuous mode [ 1060.854056][ T7936] team0 (unregistering): Port device team_slave_1 removed [ 1060.864754][ T7936] team0 (unregistering): Port device team_slave_0 removed [ 1060.874946][ T7936] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1060.911567][ T7936] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1060.988339][ T7936] bond0 (unregistering): Released all slaves 04:51:56 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000916, 0x4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0x1, 0x8000, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="db3f06f8ec83cf0324e87f454a9831056a4fa273d72477619e80d9ccbc0ad856350b03db35e5b64131f998f07834eb3bde2c4fb89d184bcdf26a5e06002b1e1bcb43b431c7cdd5050c9125b6072aafc1ad8c45eb70b0dd0a57aeab3dc53b235a317d17e00e495eb30a60e8d0122a207570edd060dfdfcb5f8dd9433f570c2b7d69ad7c167a897b7dc8467711d38902650c463d377af4508e9a12f48c249e141812ec6edcfdfd9657de6d2b729c39673e2d44aecb72f979edb1c74a8d2701ea82c7afc00bf0ab91b37863cad720a1220cc9ab1227719569e3a0ebc36de1e0e6aa1dacc54e9a5f1f206fe9e142773ce455f6183236fdd2b4449be23a3989488f2f4caa43533a09b6592ce208febbfb1c2ae455a3ef45736fafdc387eeff506254d9f9cc7381d9c15d6dcb93eff565281f34ce87a44d6c429fd6113cba4bea71692ec15ad99318affbb08217dd137565cfbdf3a942bd30903aa1162a466d8082cbff04c410c7f35c6b25ef209c9f4200df5a8df8632368876cc2c876f33595642ba50faf31f7894f8dff96f52f853c8d2d9c2f3a8faa01dc5f7305d91c64d0efda8b4af572ce47f21", @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="f364d959e080b125773818ac153bee79603f675fb842bc9f7cec1b43e044dfa34aae7ce70277eb17b97d66acb4bfd78b624ee32354746768eab624e026ba13d0494b91a86d548660e11805f33e20f08a4e1aaed0fd9510c887b24ff0faa9c5bacc59172bd560c6504f15d6706475cddfe9dbd36ce077279577d023ed8e875757133b743317135f7467caaec9d5525cb20563aaac6548e3b121c3", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="3e581d96bdbd718304a81120b2381918380e0362990fb6a5fe0d867b0c70503bb1e9c03485f38bc04b7de25070b879a23ef65e9a57c23f279f6326f96aaff8d20e4fd6e5987946f5410644efb02088ade1ff7f00005a8c1e800759544ecd5b1ad0f453947f52875a0a4975979defe2d36cf48b96b3f36cb0a3b196dddb959ac525617c172bd76f4e46e7b797c999fa6c9e2d8c73789caa0d41280987370ea50aa4cf16563afa02ab170a3019061cbda7af1610d24ee89a00000000", @ANYRES16, @ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYBLOB="64fa41a860d3d28b386118c85673a693cb673c799e6c950486de85604179197a4cfe1dcc4737c583dc7cc2f5a1af8fef10e7c6e4ab341ae60010000000b40500358b2b218db58a9ce3e7e1f319132ab8064224e3dc2b0c1d3e0d2c0508a2ec2ee743fbb33fad01fb0587eadd7c6dd1d985b324256c191b959b3b163cb72d21f018b403764034b8f7edd06d574d56b049ee700fd0e2a72b0699f75c566858526ae28fa63f9f41511bd5fa564dac534c4512bface3683f7756b9c82c56210f6d8c4d3802a93645b17620a5247ee0760000", @ANYRESOCT, @ANYPTR]], @ANYBLOB="b7e73a1d2edd3910dcaeab8c30d059d1eb1665345e000000000000800112130be48d7b1397f69b5aee61355b5ec6a8395a8c5a833203757d4fc84e4bf0b72b148861e32ca695734ab0abab5a26801fa1efd10f4b8737e3750602d2721607a8bb4bee07eb9528c12e1e70aa4855b07d989a8c48d11e4c6cafad2067d98fd2c165ef0fa928881fa85e9e023fd6bbb74bece396aa022590ef45c7f4666193d7531ad97c7a77fcece5b04214b12c00b972a44b0fe2fe2233d9fbf99667588930b3b36eb34d34d28fc93050e20e0a27e9032ed8f207747c7cf6c870de9d800e74131b04d3933f77f091980207359d67cfbbbce18c246bd082af616e", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC, @ANYBLOB="fdff24650a06d48c6bd1507ae657bb1f27296b74128d35d4f5c9b5d14860182811f702a8958b96836fe7e06a2991b69c692854cbf3e4b0cb77a8bfaf66ce76817c83392eb3df56f646c6788cc3b7a4", @ANYRESDEC, @ANYRES32=0x0], @ANYRESHEX], 0xffffff1d) 04:51:56 executing program 2: 04:51:56 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:51:56 executing program 4: 04:51:56 executing program 0: 04:51:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:51:56 executing program 2: 04:51:56 executing program 4: 04:51:56 executing program 0: 04:51:57 executing program 2: 04:51:57 executing program 4: 04:51:57 executing program 0: [ 1065.642452][T15553] IPVS: ftp: loaded support on port[0] = 21 [ 1065.694792][T15553] chnl_net:caif_netlink_parms(): no params data found [ 1065.722031][T15553] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.729272][T15553] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.736948][T15553] device bridge_slave_0 entered promiscuous mode [ 1065.744387][T15553] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.751614][T15553] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.759495][T15553] device bridge_slave_1 entered promiscuous mode [ 1065.777258][T15553] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1065.788206][T15553] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1065.807396][T15553] team0: Port device team_slave_0 added [ 1065.814015][T15553] team0: Port device team_slave_1 added [ 1065.869640][T15553] device hsr_slave_0 entered promiscuous mode [ 1065.907310][T15553] device hsr_slave_1 entered promiscuous mode [ 1065.963351][T15553] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.970640][T15553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.978047][T15553] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.985385][T15553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.016676][T15553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1066.028927][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1066.037671][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.045931][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.055256][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1066.068040][T15553] 8021q: adding VLAN 0 to HW filter on device team0 [ 1066.079440][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1066.088387][T15108] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.095997][T15108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.106499][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1066.115357][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.122503][ T7874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1066.140979][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1066.150348][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1066.168195][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1066.178010][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1066.186362][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1066.196833][T15553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1066.210403][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1066.218234][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1066.229504][T15553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1068.177401][T14768] device bridge_slave_1 left promiscuous mode [ 1068.183655][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1068.257601][T14768] device bridge_slave_0 left promiscuous mode [ 1068.263936][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.007234][T14768] device hsr_slave_0 left promiscuous mode [ 1069.057013][T14768] device hsr_slave_1 left promiscuous mode [ 1069.124115][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1069.134703][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1069.144866][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1069.183092][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1069.268805][T14768] bond0 (unregistering): Released all slaves 04:52:09 executing program 5: 04:52:09 executing program 4: 04:52:09 executing program 0: 04:52:09 executing program 2: 04:52:09 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:52:09 executing program 4: 04:52:09 executing program 0: 04:52:09 executing program 2: 04:52:09 executing program 0: 04:52:09 executing program 4: 04:52:09 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1076.832442][T15586] IPVS: ftp: loaded support on port[0] = 21 [ 1077.221661][T15586] IPVS: ftp: loaded support on port[0] = 21 [ 1078.612782][T15597] IPVS: ftp: loaded support on port[0] = 21 [ 1078.683787][T15597] chnl_net:caif_netlink_parms(): no params data found [ 1078.710699][T15597] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.717867][T15597] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.725724][T15597] device bridge_slave_0 entered promiscuous mode [ 1078.733239][T15597] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.740339][T15597] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.748557][T15597] device bridge_slave_1 entered promiscuous mode [ 1078.766446][T15597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1078.777883][T15597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1078.797970][T15597] team0: Port device team_slave_0 added [ 1078.804954][T15597] team0: Port device team_slave_1 added [ 1078.869641][T15597] device hsr_slave_0 entered promiscuous mode [ 1078.907312][T15597] device hsr_slave_1 entered promiscuous mode [ 1078.983214][T15597] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.990577][T15597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.998064][T15597] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.005177][T15597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.036227][T15597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1079.048702][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1079.056632][T15108] bridge0: port 1(bridge_slave_0) entered disabled state [ 1079.064874][T15108] bridge0: port 2(bridge_slave_1) entered disabled state [ 1079.073869][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1079.086148][T15597] 8021q: adding VLAN 0 to HW filter on device team0 [ 1079.099989][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1079.108782][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.115804][ T7874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.128777][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1079.137387][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.144414][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1079.164445][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1079.173462][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1079.191265][T15597] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1079.202151][T15597] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1079.214464][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1079.223287][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1079.231869][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1079.240749][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1079.253816][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1079.261568][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1079.272732][T15597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1081.477711][ T7921] device bridge_slave_1 left promiscuous mode [ 1081.483933][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1081.547418][ T7921] device bridge_slave_0 left promiscuous mode [ 1081.553665][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.277230][ T7921] device hsr_slave_0 left promiscuous mode [ 1082.316883][ T7921] device hsr_slave_1 left promiscuous mode [ 1082.364169][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 1082.375034][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 1082.385461][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:52:15 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x201402, 0x0) syz_genetlink_get_family_id$team(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) getpeername$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14) accept$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r6}]]}}}]}, 0x38}}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00G\xf2\xe2(\xa1H\"\xf7\xf3\x9b\xa6\x00\xe1\xc6\x1f\x06\xa7\x8f\x1cq\x86\xbd\xf1\xd6\xadO,\xbc\f;RwP\xd4\x18\xbea&\x0f\x91\xaf') getdents64(r7, &(0x7f0000000000)=""/173, 0xad) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000980)={0x0, @multicast1, @dev}, &(0x7f00000009c0)=0xc) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r11}]]}}}]}, 0x38}}, 0x0) recvmsg$kcm(r0, &(0x7f0000000fc0)={&(0x7f0000000a40)=@hci, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000ac0)=""/197, 0xc5}, {&(0x7f0000000bc0)=""/68, 0x44}, {&(0x7f0000000c40)=""/231, 0xe7}, {&(0x7f0000000d40)=""/166, 0xa6}, {&(0x7f0000000e00)=""/167, 0xa7}, {&(0x7f0000000ec0)=""/42, 0x2a}], 0x6, &(0x7f0000000f80)=""/63, 0x3f}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r14}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000002640)) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r19}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002680)={'team0\x00'}) r20 = syz_open_procfs(0x0, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r23}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r20, 0x8933, &(0x7f0000002740)={'team0\x00', r23}) getpeername$packet(r0, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000027c0)=0x14) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002800)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009400)=[{{&(0x7f0000002840), 0x80, &(0x7f0000002b40)=[{0x0}, {0x0}, {&(0x7f00000029c0)=""/98, 0x62}, {&(0x7f0000002a40)=""/236, 0xec}], 0x4, &(0x7f0000002b80)=""/24, 0x18}, 0x6}, {{0x0, 0x0, &(0x7f0000003e00)=[{&(0x7f0000002c40)=""/92, 0x5c}, {&(0x7f0000002cc0)=""/127, 0x7f}, {&(0x7f0000002d40)=""/187, 0xbb}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x4}, 0x5}, {{0x0, 0x0, &(0x7f0000004280)=[{&(0x7f0000004180)=""/210, 0xd2}], 0x1, &(0x7f00000042c0)=""/125, 0x7d}, 0x80}, {{0x0, 0x0, &(0x7f0000005580)=[{0x0}, {&(0x7f0000005540)=""/2, 0x2}], 0x2, &(0x7f00000055c0)=""/86, 0x56}, 0x9}, {{&(0x7f0000005640)=@isdn, 0x80, &(0x7f0000007a00)=[{&(0x7f00000066c0)=""/187, 0xbb}, {&(0x7f0000006780)=""/88, 0x58}, {&(0x7f0000006800)=""/7, 0x7}, {&(0x7f0000006840)=""/47, 0x2f}, {0x0}, {&(0x7f0000006900)=""/4096, 0x1000}, {&(0x7f0000007900)=""/214, 0xd6}], 0x7, &(0x7f0000007a80)=""/187, 0xbb}, 0x2}, {{0x0, 0x0, &(0x7f0000008c00)=[{&(0x7f0000007b40)=""/4, 0x4}, {&(0x7f0000007b80)=""/4096, 0x1000}, {&(0x7f0000008b80)=""/12, 0xc}, {&(0x7f0000008bc0)=""/61, 0x3d}], 0x4, &(0x7f0000008c40)=""/223, 0xdf}, 0xffffff01}, {{0x0, 0x0, &(0x7f0000008e40)=[{&(0x7f0000008d40)=""/87, 0x57}, {&(0x7f0000008dc0)=""/61, 0x3d}, {&(0x7f0000008e00)=""/30, 0x1e}], 0x3}, 0xed}, {{&(0x7f0000008ec0)=@alg, 0x80, &(0x7f0000009180)=[{&(0x7f0000008f40)=""/31, 0x1f}, {&(0x7f0000008f80)=""/210, 0xd2}, {&(0x7f0000009080)=""/230, 0xe6}], 0x3, &(0x7f00000091c0)=""/183, 0xb7}, 0x685}, {{&(0x7f0000009280)=@xdp, 0x80, &(0x7f00000093c0)=[{0x0}, {&(0x7f0000009340)=""/83, 0x53}], 0x2}, 0x6e}], 0x9, 0x101, 0x0) r26 = socket$netlink(0x10, 0x3, 0x0) r27 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r27, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r26, 0x0, 0x0) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r28, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r30}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009680)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000009780)=0xe8) r31 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00G\xf2\xe2(\xa1H\"\xf7\xf3\x9b\xa6\x00\xe1\xc6\x1f\x06\xa7\x8f\x1cq\x86\xbd\xf1\xd6\xadO,\xbc\f;RwP\xd4\x18\xbea&\x0f\x91\xaf') getdents64(r31, &(0x7f0000000000)=""/173, 0xad) ioctl$ifreq_SIOCGIFINDEX_team(r31, 0x8933, &(0x7f00000097c0)={'team0\x00'}) socket$netlink(0x10, 0x3, 0x0) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a000)={@mcast1}, &(0x7f000000a040)=0x14) r33 = socket$netlink(0x10, 0x3, 0x0) r34 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r34, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r34, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r33, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r35}]]}}}]}, 0x38}}, 0x0) r36 = syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r36, 0x0, 0x10, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@dev}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f000000b4c0)=0xe8) r37 = socket$netlink(0x10, 0x3, 0x0) r38 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r38, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r37, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000b580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x14) r39 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_mreq(r39, 0x29, 0x0, &(0x7f000000b600)={@local}, &(0x7f000000b640)=0x14) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b6c0)={@rand_addr, @multicast2}, &(0x7f000000b700)=0xc) 04:52:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) setgid(0x0) getgroups(0x1, &(0x7f00000001c0)=[0x0]) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x5cfc285fa6ae3c46, &(0x7f00000002c0), 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x40, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/autofs\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xa93f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="0fae050f015c27d0ad00000f20e06635040000000f22e03e660f3a0953f9056467f2af0f01ca66b8c10000000f23c00f21f86635030005000f23f80f20e06635002000000f22e0baa100b80000ef", 0x4e}], 0x0, 0xcffa808b513f9dfd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:52:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f00000002c0)={0x0, 0x2}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 04:52:15 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:52:15 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x151) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r3, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1082.441064][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1082.602108][T15613] IPVS: ftp: loaded support on port[0] = 21 [ 1082.683829][ T7921] bond0 (unregistering): Released all slaves [ 1082.746826][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1082.752662][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:52:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) setgid(0x0) getgroups(0x1, &(0x7f00000001c0)=[0x0]) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x5cfc285fa6ae3c46, &(0x7f00000002c0), 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x40, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/autofs\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xa93f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="0fae050f015c27d0ad00000f20e06635040000000f22e03e660f3a0953f9056467f2af0f01ca66b8c10000000f23c00f21f86635030005000f23f80f20e06635002000000f22e0baa100b80000ef", 0x4e}], 0x0, 0xcffa808b513f9dfd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:52:16 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 1084.667738][T15611] bridge0: port 2(bridge_slave_1) entered disabled state [ 1084.674969][T15611] bridge0: port 1(bridge_slave_0) entered disabled state 04:52:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) [ 1086.596422][T15653] IPVS: ftp: loaded support on port[0] = 21 [ 1086.761195][T15653] chnl_net:caif_netlink_parms(): no params data found [ 1086.838913][T15653] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.846160][T15653] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.870889][T15653] device bridge_slave_0 entered promiscuous mode [ 1086.880482][T15653] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.898114][T15653] bridge0: port 2(bridge_slave_1) entered disabled state [ 1086.917066][T15653] device bridge_slave_1 entered promiscuous mode [ 1086.968063][T15653] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1087.012901][T15653] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1087.070983][T15653] team0: Port device team_slave_0 added [ 1087.087670][T15653] team0: Port device team_slave_1 added [ 1087.183819][T15653] device hsr_slave_0 entered promiscuous mode [ 1087.237282][T15653] device hsr_slave_1 entered promiscuous mode [ 1087.284302][T15653] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.291429][T15653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.298783][T15653] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.305873][T15653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.403897][T15653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1087.433621][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1087.442559][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.457183][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.480969][T15653] 8021q: adding VLAN 0 to HW filter on device team0 [ 1087.499501][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1087.517520][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1087.525984][ T7885] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.533044][ T7885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.552719][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1087.561710][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1087.570522][ T8520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.577581][ T8520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.585827][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1087.594922][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1087.604048][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1087.612641][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1087.621514][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1087.630435][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1087.641070][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1087.649398][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1087.658479][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1087.681404][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1087.690124][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1087.704220][T15653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1087.725012][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1087.732697][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1087.746483][T15653] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1089.247541][ T28] device bridge_slave_1 left promiscuous mode [ 1089.253817][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.307418][ T28] device bridge_slave_0 left promiscuous mode [ 1089.313649][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.378596][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.417637][ T28] device bridge_slave_0 left promiscuous mode [ 1089.423791][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.147160][ T28] device hsr_slave_0 left promiscuous mode [ 1090.196920][ T28] device hsr_slave_1 left promiscuous mode [ 1090.243440][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1090.254272][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1090.264504][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1090.310105][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1090.391024][ T28] bond0 (unregistering): Released all slaves [ 1090.527189][ T28] device hsr_slave_0 left promiscuous mode [ 1090.567073][ T28] device hsr_slave_1 left promiscuous mode [ 1090.613597][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1090.624919][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1090.636471][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1090.670291][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1090.749215][ T28] bond0 (unregistering): Released all slaves 04:52:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2c) 04:52:25 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) setgid(0x0) getgroups(0x1, &(0x7f00000001c0)=[0x0]) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x5cfc285fa6ae3c46, &(0x7f00000002c0), 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x40, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/autofs\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xa93f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="0fae050f015c27d0ad00000f20e06635040000000f22e03e660f3a0953f9056467f2af0f01ca66b8c10000000f23c00f21f86635030005000f23f80f20e06635002000000f22e0baa100b80000ef", 0x4e}], 0x0, 0xcffa808b513f9dfd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:52:25 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:52:25 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}, 0x10) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 04:52:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1092.094742][T15682] IPVS: ftp: loaded support on port[0] = 21 [ 1092.522797][T15680] cgroup: fork rejected by pids controller in /syz3 04:52:26 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:26 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1093.030733][T15693] IPVS: ftp: loaded support on port[0] = 21 [ 1093.399252][ T28] device bridge_slave_1 left promiscuous mode [ 1093.405484][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.457537][ T28] device bridge_slave_0 left promiscuous mode [ 1093.465036][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 04:52:26 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x4000000) 04:52:27 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) 04:52:28 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) [ 1094.697165][ T28] device hsr_slave_0 left promiscuous mode [ 1094.736967][ T28] device hsr_slave_1 left promiscuous mode [ 1094.834411][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1094.845856][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1094.861009][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1094.930888][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:52:28 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000008b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) [ 1095.051219][ T28] bond0 (unregistering): Released all slaves [ 1095.222525][T15723] IPVS: ftp: loaded support on port[0] = 21 [ 1095.233577][T15706] IPVS: ftp: loaded support on port[0] = 21 [ 1095.243072][T15721] IPVS: ftp: loaded support on port[0] = 21 [ 1095.486299][T15721] chnl_net:caif_netlink_parms(): no params data found [ 1095.537541][T15706] chnl_net:caif_netlink_parms(): no params data found [ 1095.586402][T15723] chnl_net:caif_netlink_parms(): no params data found [ 1095.604601][T15721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.612526][T15721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.621158][T15721] device bridge_slave_0 entered promiscuous mode [ 1095.663823][T15721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.671096][T15721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1095.679252][T15721] device bridge_slave_1 entered promiscuous mode [ 1095.697683][T15723] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.705150][T15723] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.713846][T15723] device bridge_slave_0 entered promiscuous mode [ 1095.721655][T15706] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.732618][T15706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.740842][T15706] device bridge_slave_0 entered promiscuous mode [ 1095.754628][T15723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.762415][T15723] bridge0: port 2(bridge_slave_1) entered disabled state [ 1095.770789][T15723] device bridge_slave_1 entered promiscuous mode [ 1095.783027][T15706] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.790909][T15706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1095.799263][T15706] device bridge_slave_1 entered promiscuous mode [ 1095.807928][T15721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1095.835330][T15706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1095.851477][T15721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1095.862751][T15723] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1095.873611][T15706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1095.889868][T15723] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1095.915802][T15706] team0: Port device team_slave_0 added [ 1095.923062][T15706] team0: Port device team_slave_1 added [ 1095.935002][T15721] team0: Port device team_slave_0 added [ 1095.949612][T15723] team0: Port device team_slave_0 added [ 1095.956436][T15723] team0: Port device team_slave_1 added [ 1095.969291][T15721] team0: Port device team_slave_1 added [ 1096.039547][T15706] device hsr_slave_0 entered promiscuous mode [ 1096.107688][T15706] device hsr_slave_1 entered promiscuous mode [ 1096.199352][T15723] device hsr_slave_0 entered promiscuous mode [ 1096.267377][T15723] device hsr_slave_1 entered promiscuous mode [ 1096.306912][T15723] debugfs: Directory 'hsr0' with parent '/' already present! [ 1096.349318][T15721] device hsr_slave_0 entered promiscuous mode [ 1096.427228][T15721] device hsr_slave_1 entered promiscuous mode [ 1096.466934][T15721] debugfs: Directory 'hsr0' with parent '/' already present! [ 1096.561626][T15706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1096.581640][T15721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1096.614165][T15706] 8021q: adding VLAN 0 to HW filter on device team0 [ 1096.629986][T15721] 8021q: adding VLAN 0 to HW filter on device team0 [ 1096.638416][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1096.646152][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1096.654009][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1096.662000][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1096.682943][T15723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1096.703129][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1096.711949][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1096.720705][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.727753][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1096.735522][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1096.744432][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1096.752901][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.759971][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1096.767979][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1096.776677][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1096.785243][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.792287][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1096.800261][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1096.809583][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1096.818898][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1096.827684][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1096.836646][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1096.846033][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1096.855380][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1096.863765][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1096.873206][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1096.881271][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1096.889478][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1096.898408][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1096.907366][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1096.915821][T12733] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.922904][T12733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1096.945459][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1096.954808][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1096.969282][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1096.978680][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1096.987346][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1096.995741][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1097.004597][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1097.019297][T15706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1097.033273][T15721] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1097.046610][T15721] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1097.060924][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1097.069812][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1097.078889][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1097.086595][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1097.094454][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1097.102957][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1097.111658][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1097.120274][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1097.129275][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1097.141287][T15723] 8021q: adding VLAN 0 to HW filter on device team0 [ 1097.160772][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1097.169743][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1097.179077][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1097.186115][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1097.203620][T15721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1097.211190][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1097.219873][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1097.230633][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1097.239944][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1097.247028][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1097.255589][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1097.265013][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1097.272753][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1097.280441][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1097.301418][T15706] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1097.315186][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1097.324364][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1097.334091][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1097.343092][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1097.351104][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1097.360436][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1097.369935][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1097.378825][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1097.387655][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1097.408081][T15723] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1097.419436][T15723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1097.428037][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1097.436586][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1097.476197][T15723] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1097.509474][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1097.527569][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1100.567539][T14768] device bridge_slave_1 left promiscuous mode [ 1100.573847][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.627967][T14768] device bridge_slave_0 left promiscuous mode [ 1100.634316][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.667904][T14768] device bridge_slave_1 left promiscuous mode [ 1100.674112][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.717396][T14768] device bridge_slave_0 left promiscuous mode [ 1100.723568][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1102.077213][T14768] device hsr_slave_0 left promiscuous mode [ 1102.116910][T14768] device hsr_slave_1 left promiscuous mode [ 1102.164891][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1102.175104][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1102.185776][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1102.221391][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1102.299476][T14768] bond0 (unregistering): Released all slaves [ 1102.457160][T14768] device hsr_slave_0 left promiscuous mode [ 1102.496887][T14768] device hsr_slave_1 left promiscuous mode [ 1102.544340][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1102.555149][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1102.565196][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1102.610214][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1102.669541][T14768] bond0 (unregistering): Released all slaves 04:52:36 executing program 5: 04:52:36 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 04:52:36 executing program 3: 04:52:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}, 0x10) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 04:52:36 executing program 0: 04:52:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:52:36 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) [ 1103.486689][T15769] IPVS: ftp: loaded support on port[0] = 21 04:52:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918be", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:37 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 1104.203004][T15889] IPVS: ftp: loaded support on port[0] = 21 04:52:37 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 1104.721089][T15893] IPVS: ftp: loaded support on port[0] = 21 04:52:38 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1105.246184][T15897] IPVS: ftp: loaded support on port[0] = 21 [ 1105.596713][T15901] IPVS: ftp: loaded support on port[0] = 21 [ 1105.698424][T15901] chnl_net:caif_netlink_parms(): no params data found [ 1105.730340][T15901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.737598][T15901] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.745410][T15901] device bridge_slave_0 entered promiscuous mode [ 1105.753129][T15901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.760218][T15901] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.768238][T15901] device bridge_slave_1 entered promiscuous mode [ 1105.787673][T15901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1105.798416][T15901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1105.819413][T15901] team0: Port device team_slave_0 added [ 1105.825962][T15901] team0: Port device team_slave_1 added [ 1105.879076][T15901] device hsr_slave_0 entered promiscuous mode [ 1105.917085][T15901] device hsr_slave_1 entered promiscuous mode [ 1105.956923][T15901] debugfs: Directory 'hsr0' with parent '/' already present! [ 1105.972695][T15901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.979894][T15901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1105.987227][T15901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.994286][T15901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1106.027832][T15901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1106.040811][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1106.049716][T12733] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.058310][T12733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.067627][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1106.080389][T15901] 8021q: adding VLAN 0 to HW filter on device team0 [ 1106.091533][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1106.100023][T12733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.107153][T12733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1106.117821][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1106.126188][T12904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.133294][T12904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1106.156408][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1106.174736][T15901] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1106.185674][T15901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1106.199755][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1106.209213][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1106.218654][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1106.228128][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1106.237161][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1106.255377][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1106.263199][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1106.273804][T15901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1106.289936][T15905] IPVS: ftp: loaded support on port[0] = 21 [ 1106.415487][T15905] chnl_net:caif_netlink_parms(): no params data found [ 1106.475853][T15905] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.483356][T15905] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.491852][T15905] device bridge_slave_0 entered promiscuous mode [ 1106.504910][T15905] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.513396][T15905] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.521529][T15905] device bridge_slave_1 entered promiscuous mode [ 1106.544745][T15905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1106.555852][T15905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1106.575078][T15905] team0: Port device team_slave_0 added [ 1106.581717][T15905] team0: Port device team_slave_1 added [ 1106.640062][T15905] device hsr_slave_0 entered promiscuous mode [ 1106.677171][T15905] device hsr_slave_1 entered promiscuous mode [ 1106.716908][T15905] debugfs: Directory 'hsr0' with parent '/' already present! [ 1106.782953][T15905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1106.793719][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1106.801940][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1106.817580][T15905] 8021q: adding VLAN 0 to HW filter on device team0 [ 1106.826672][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1106.835871][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1106.844765][T12904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.851851][T12904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1106.860863][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1106.879624][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1106.893098][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1106.903787][T15108] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.911007][T15108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1106.935177][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1106.947936][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1106.968495][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1106.977561][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1106.986293][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1106.995666][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1107.004610][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1107.013004][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1107.021445][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1107.040914][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1107.049423][T12733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1107.059921][T15905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1107.075598][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1107.083351][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1107.170836][T15905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1109.327512][T14768] device bridge_slave_1 left promiscuous mode [ 1109.333740][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1109.377439][T14768] device bridge_slave_0 left promiscuous mode [ 1109.383643][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1110.137075][T14768] device hsr_slave_0 left promiscuous mode [ 1110.216858][T14768] device hsr_slave_1 left promiscuous mode [ 1110.274389][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1110.285507][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1110.295823][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1110.340262][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1110.418552][T14768] bond0 (unregistering): Released all slaves 04:52:45 executing program 5: 04:52:45 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:52:45 executing program 0: 04:52:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:45 executing program 3: 04:52:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1111.819608][T15933] IPVS: ftp: loaded support on port[0] = 21 04:52:45 executing program 0: 04:52:45 executing program 3: 04:52:45 executing program 3: 04:52:45 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:52:45 executing program 0: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) 04:52:45 executing program 3: [ 1112.344056][T15946] IPVS: ftp: loaded support on port[0] = 21 [ 1113.950957][T15957] IPVS: ftp: loaded support on port[0] = 21 [ 1114.008197][T15957] chnl_net:caif_netlink_parms(): no params data found [ 1114.037150][T15957] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.045190][T15957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.052989][T15957] device bridge_slave_0 entered promiscuous mode [ 1114.062751][T15957] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.069983][T15957] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.077979][T15957] device bridge_slave_1 entered promiscuous mode [ 1114.095158][T15957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1114.108367][T15957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1114.126288][T15957] team0: Port device team_slave_0 added [ 1114.133495][T15957] team0: Port device team_slave_1 added [ 1114.199121][T15957] device hsr_slave_0 entered promiscuous mode [ 1114.237230][T15957] device hsr_slave_1 entered promiscuous mode [ 1114.276834][T15957] debugfs: Directory 'hsr0' with parent '/' already present! [ 1114.293576][T15957] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.300859][T15957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1114.308254][T15957] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.315394][T15957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1114.352242][T15957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1114.413727][T15957] 8021q: adding VLAN 0 to HW filter on device team0 [ 1114.421561][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1114.430391][T12904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.439043][T12904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.449360][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1114.473681][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1114.482338][T12904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.489405][T12904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1114.498182][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1114.506653][T12904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.513726][T12904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1114.533572][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1114.543296][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1114.563776][T15957] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1114.574569][T15957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1114.593450][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1114.603738][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1114.615917][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1114.638233][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1114.645917][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1114.659602][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1114.673983][T15957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1116.627383][ T64] device bridge_slave_1 left promiscuous mode [ 1116.633857][ T64] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.677514][ T64] device bridge_slave_0 left promiscuous mode [ 1116.683755][ T64] bridge0: port 1(bridge_slave_0) entered disabled state [ 1117.406985][ T64] device hsr_slave_0 left promiscuous mode [ 1117.457330][ T64] device hsr_slave_1 left promiscuous mode [ 1117.503748][ T64] team0 (unregistering): Port device team_slave_1 removed [ 1117.515100][ T64] team0 (unregistering): Port device team_slave_0 removed [ 1117.526030][ T64] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1117.560886][ T64] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1117.619084][ T64] bond0 (unregistering): Released all slaves 04:52:51 executing program 5: 04:52:51 executing program 0: 04:52:51 executing program 3: 04:52:51 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:52:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:52:51 executing program 3: [ 1118.187755][T15973] IPVS: ftp: loaded support on port[0] = 21 04:52:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000440)=""/4096, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) openat$audio(0xffffffffffffff9c, 0x0, 0x140202, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000008440), 0x400000000000107, 0x8000) 04:52:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x140202, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @local}}, 0x0, 0x7}, &(0x7f0000000140)=0x90) sendmmsg(r1, &(0x7f0000008440), 0x400000000000107, 0x8000) 04:52:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:52 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1119.152612][T16000] IPVS: ftp: loaded support on port[0] = 21 [ 1120.815707][T16007] IPVS: ftp: loaded support on port[0] = 21 [ 1120.910966][T16007] chnl_net:caif_netlink_parms(): no params data found [ 1120.951975][T16007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1120.959816][T16007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1120.971830][T16007] device bridge_slave_0 entered promiscuous mode [ 1120.980903][T16007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1120.992247][T16007] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.001049][T16007] device bridge_slave_1 entered promiscuous mode [ 1121.026151][T16007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1121.041601][T16007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1121.069703][T16007] team0: Port device team_slave_0 added [ 1121.076626][T16007] team0: Port device team_slave_1 added [ 1121.142450][T16007] device hsr_slave_0 entered promiscuous mode [ 1121.197187][T16007] device hsr_slave_1 entered promiscuous mode [ 1121.236859][T16007] debugfs: Directory 'hsr0' with parent '/' already present! [ 1121.259314][T16007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.266396][T16007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.273730][T16007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.280880][T16007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.319763][T16007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1121.332399][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1121.341423][T12904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.349966][T12904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.359504][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1121.372379][T16007] 8021q: adding VLAN 0 to HW filter on device team0 [ 1121.383439][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1121.392507][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.399726][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.411966][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1121.420443][T15108] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.427481][T15108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.445180][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1121.454287][T12904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1121.465825][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1121.482803][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1121.491506][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1121.503114][T16007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1121.519135][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1121.526653][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1121.538769][T16007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1123.577512][ T28] device bridge_slave_1 left promiscuous mode [ 1123.583796][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1123.637854][ T28] device bridge_slave_0 left promiscuous mode [ 1123.644039][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 1124.367179][ T28] device hsr_slave_0 left promiscuous mode [ 1124.416995][ T28] device hsr_slave_1 left promiscuous mode [ 1124.492574][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1124.503275][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1124.513885][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1124.579956][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1124.639124][ T28] bond0 (unregistering): Released all slaves 04:52:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6000000010000100"/20, @ANYRES32=r1, @ANYBLOB="000000000000000040001200100001006970366772657461700000002c00020014000700ff00000000000000960b981970e2de760000000000000000000000000001d43f4be294270fe0fc32fb78bc3ffd7e5f0c04b931fe044b5d929681308e52070cd2f3d9556da508cde353fbe517c625fe4f"], 0x60}}, 0x0) 04:52:59 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) io_submit(r1, 0x2ff, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000380)="b77e510de106009bef67deca834af8e8d91cffbfa015284c4ef424a5b3814290a79fbd34ccdb2e407f1ecc9ba398a5341ce957e135023c7b6ca0f0f5864fa9bb02", 0x377140be6b5ef726}]) chmod(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 04:52:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x140202, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @local}}, 0x0, 0x7}, &(0x7f0000000140)=0x90) sendmmsg(r1, &(0x7f0000008440), 0x400000000000107, 0x8000) 04:52:59 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:52:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) 04:52:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:52:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1126.586202][T16026] IPVS: ftp: loaded support on port[0] = 21 04:53:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x140202, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @local}}, 0x0, 0x7}, &(0x7f0000000140)=0x90) sendmmsg(r1, &(0x7f0000008440), 0x400000000000107, 0x8000) 04:53:00 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1127.417431][T16042] IPVS: ftp: loaded support on port[0] = 21 04:53:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 04:53:01 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00001c6000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000689000/0x3000)=nil) 04:53:01 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1127.917560][T16051] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1127.947213][T16051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1127.966063][T16051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1128.008399][T16057] IPVS: ftp: loaded support on port[0] = 21 [ 1128.050984][T16051] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1128.062266][T16051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1128.070198][T16051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1128.935630][T16164] IPVS: ftp: loaded support on port[0] = 21 [ 1129.013080][T16164] chnl_net:caif_netlink_parms(): no params data found [ 1129.040301][T16164] bridge0: port 1(bridge_slave_0) entered blocking state [ 1129.047678][T16164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1129.055502][T16164] device bridge_slave_0 entered promiscuous mode [ 1129.062973][T16164] bridge0: port 2(bridge_slave_1) entered blocking state [ 1129.070192][T16164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1129.078099][T16164] device bridge_slave_1 entered promiscuous mode [ 1129.096143][T16164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1129.107273][T16164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1129.126105][T16164] team0: Port device team_slave_0 added [ 1129.132937][T16164] team0: Port device team_slave_1 added [ 1129.179261][T16164] device hsr_slave_0 entered promiscuous mode [ 1129.227230][T16164] device hsr_slave_1 entered promiscuous mode [ 1129.276878][T16164] debugfs: Directory 'hsr0' with parent '/' already present! [ 1129.294004][T16164] bridge0: port 2(bridge_slave_1) entered blocking state [ 1129.301092][T16164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1129.308426][T16164] bridge0: port 1(bridge_slave_0) entered blocking state [ 1129.315465][T16164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1129.346704][T16164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1129.364313][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1129.372734][ T7885] bridge0: port 1(bridge_slave_0) entered disabled state [ 1129.381015][ T7885] bridge0: port 2(bridge_slave_1) entered disabled state [ 1129.390704][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1129.402915][T16164] 8021q: adding VLAN 0 to HW filter on device team0 [ 1129.416729][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1129.425125][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1129.432216][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1129.447632][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1129.456029][ T7885] bridge0: port 2(bridge_slave_1) entered blocking state [ 1129.463184][ T7885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1129.475016][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1129.484526][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1129.504056][T16164] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1129.514799][T16164] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1129.528646][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1129.537666][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1129.546135][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1129.554805][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1129.572320][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1129.579820][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1129.591952][T16164] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1131.847851][ T7921] device bridge_slave_1 left promiscuous mode [ 1131.854104][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.897481][ T7921] device bridge_slave_0 left promiscuous mode [ 1131.903662][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.637107][ T7921] device hsr_slave_0 left promiscuous mode [ 1132.676930][ T7921] device hsr_slave_1 left promiscuous mode [ 1132.724443][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 1132.735107][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 1132.745241][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1132.781323][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1132.840396][ T7921] bond0 (unregistering): Released all slaves 04:53:09 executing program 5: syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x78, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000, 0x0, 0x0, 0x60], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @rand_addr="bb467fbc264c2d96b2c55265e0114569", [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0x8847}, @jumbo]}, @routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}]}}}}}}}, 0x0) 04:53:09 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = eventfd(0x0) r2 = eventfd(0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000080)={r2}) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000100)={r2, 0x20000000, 0x2, r1}) 04:53:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 04:53:09 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1135.836326][T16187] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1135.851891][T16187] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1135.860185][T16187] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1135.881445][T16190] IPVS: ftp: loaded support on port[0] = 21 04:53:09 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$apparmor_exec(r1, &(0x7f0000000600)={'\\C\x1b]P\x0e\x06C\xc3MY\x1d\x9b9%\a\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeaa\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0xfdcb) 04:53:09 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:09 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = eventfd(0x0) r1 = eventfd(0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={r1}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r1, 0x20000000, 0x2, r0}) [ 1136.235325][ T25] audit: type=1804 audit(1573534389.542:42): pid=16294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=2328 res=1 [ 1136.317927][ T25] audit: type=1804 audit(1573534389.572:43): pid=16295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=2328 res=1 04:53:09 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x80002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x2, {0xa94}}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r3 = eventfd(0x0) r4 = eventfd(0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000080)={r4}) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000100)={r4, 0x20000000, 0x2, r3}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) [ 1136.451482][T16300] IPVS: ftp: loaded support on port[0] = 21 04:53:10 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = eventfd(0x0) r1 = eventfd(0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={r1}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r1, 0x20000000, 0x2, r0}) 04:53:10 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1137.094639][T16417] IPVS: ftp: loaded support on port[0] = 21 [ 1138.192112][T16426] IPVS: ftp: loaded support on port[0] = 21 [ 1138.247494][T16426] chnl_net:caif_netlink_parms(): no params data found [ 1138.274760][T16426] bridge0: port 1(bridge_slave_0) entered blocking state [ 1138.282243][T16426] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.290073][T16426] device bridge_slave_0 entered promiscuous mode [ 1138.301446][T16426] bridge0: port 2(bridge_slave_1) entered blocking state [ 1138.308624][T16426] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.316285][T16426] device bridge_slave_1 entered promiscuous mode [ 1138.333850][T16426] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1138.344622][T16426] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1138.366723][T16426] team0: Port device team_slave_0 added [ 1138.373351][T16426] team0: Port device team_slave_1 added [ 1138.439300][T16426] device hsr_slave_0 entered promiscuous mode [ 1138.507177][T16426] device hsr_slave_1 entered promiscuous mode [ 1138.556883][T16426] debugfs: Directory 'hsr0' with parent '/' already present! [ 1138.574411][T16426] bridge0: port 2(bridge_slave_1) entered blocking state [ 1138.581550][T16426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1138.588861][T16426] bridge0: port 1(bridge_slave_0) entered blocking state [ 1138.595949][T16426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1138.632759][T16426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1138.644779][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1138.653164][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.661250][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.671075][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1138.686599][T16426] 8021q: adding VLAN 0 to HW filter on device team0 [ 1138.697461][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1138.705968][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1138.713080][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1138.724170][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1138.733019][T15666] bridge0: port 2(bridge_slave_1) entered blocking state [ 1138.740141][T15666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1138.769344][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1138.779273][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1138.788063][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1138.796376][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1138.805778][T16426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1138.815675][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1138.843688][T16426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1138.871193][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1138.879458][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1141.047326][ T7921] device bridge_slave_1 left promiscuous mode [ 1141.053663][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1141.107510][ T7921] device bridge_slave_0 left promiscuous mode [ 1141.113773][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1141.817384][ T7921] device hsr_slave_0 left promiscuous mode [ 1141.897004][ T7921] device hsr_slave_1 left promiscuous mode [ 1141.952838][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 1141.964229][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 1141.974396][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1142.010530][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1142.089710][ T7921] bond0 (unregistering): Released all slaves 04:53:18 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x118004c}) r3 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x2, 0x0, 0xfffffffffffffffa, 0xfd8, 0x9, 0x7, 0x9, 0x10001, 0x0, 0x0, 0x3ff, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r3, 0x0, 0x0) fstat(r3, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xfffffffffffffe8e) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000380)={@mcast2, 0x6, 0x2, 0xff, 0x9, 0xfff, 0x4}, &(0x7f00000009c0)=0x20) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r4, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x33}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@rand_addr="1a8c14af67de9071870aa1c96facbd14", @mcast1, @ipv4={[], [], @remote}, 0x1, 0x8, 0xff57, 0x400, 0x6, 0x2000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe2(0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 04:53:18 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x80002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x2, {0xa94}}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r3 = eventfd(0x0) r4 = eventfd(0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000080)={r4}) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000100)={r4, 0x20000000, 0x2, r3}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) 04:53:18 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_POLL(r0, 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = eventfd(0x0) r2 = eventfd(0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000100)={r2, 0x20000000, 0x2, r1}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) 04:53:18 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1145.151586][T16448] IPVS: ftp: loaded support on port[0] = 21 04:53:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000a40)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 04:53:18 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ioctl$VT_ACTIVATE(r1, 0x4b63, 0x0) [ 1145.641730][ T25] audit: type=1804 audit(1573534398.952:44): pid=16560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=2328 res=1 04:53:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000a40)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 04:53:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/116) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) fstat(0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', 0x0, &(0x7f0000000180)='9p\x00', 0x2800, &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB='\x00']) sendfile(r0, r0, 0x0, 0x8800000) 04:53:19 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000100)={0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x2}) socket$inet_tcp(0x2, 0x1, 0x0) [ 1145.858476][ T25] audit: type=1800 audit(1573534399.172:45): pid=16568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16869 res=0 [ 1146.020800][T16572] IPVS: ftp: loaded support on port[0] = 21 [ 1147.547556][T16683] IPVS: ftp: loaded support on port[0] = 21 [ 1147.608006][T16683] chnl_net:caif_netlink_parms(): no params data found [ 1147.635248][T16683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.642408][T16683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1147.650253][T16683] device bridge_slave_0 entered promiscuous mode [ 1147.660156][T16683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1147.667270][T16683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1147.674903][T16683] device bridge_slave_1 entered promiscuous mode [ 1147.693107][T16683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1147.703887][T16683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1147.725309][T16683] team0: Port device team_slave_0 added [ 1147.731810][T16683] team0: Port device team_slave_1 added [ 1147.789777][T16683] device hsr_slave_0 entered promiscuous mode [ 1147.827280][T16683] device hsr_slave_1 entered promiscuous mode [ 1147.886841][T16683] debugfs: Directory 'hsr0' with parent '/' already present! [ 1147.902071][T16683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1147.909320][T16683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1147.916610][T16683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.923732][T16683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1147.957366][T16683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1147.971005][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1147.979288][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1147.987709][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1147.996994][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1148.009321][T16683] 8021q: adding VLAN 0 to HW filter on device team0 [ 1148.021389][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1148.030024][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1148.037079][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1148.050935][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1148.059986][ T7885] bridge0: port 2(bridge_slave_1) entered blocking state [ 1148.067050][ T7885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1148.088514][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1148.097978][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1148.106736][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1148.124341][T16683] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1148.139720][T16683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1148.159749][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1148.170028][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1148.255068][T16683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1148.264816][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1148.274604][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1150.357450][ T7921] device bridge_slave_1 left promiscuous mode [ 1150.363817][ T7921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1150.417572][ T7921] device bridge_slave_0 left promiscuous mode [ 1150.423849][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.167118][ T7921] device hsr_slave_0 left promiscuous mode [ 1151.226929][ T7921] device hsr_slave_1 left promiscuous mode [ 1151.283025][ T7921] team0 (unregistering): Port device team_slave_1 removed [ 1151.293664][ T7921] team0 (unregistering): Port device team_slave_0 removed [ 1151.304107][ T7921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1151.360875][ T7921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1151.429750][ T7921] bond0 (unregistering): Released all slaves 04:53:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) 04:53:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xa) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f00000002c0)={0x0, 0x2, @stop_pts=0x1f}) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 04:53:27 executing program 0: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890c, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x24}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:53:27 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1154.434373][T16703] hfs: can't find a HFS filesystem on dev loop3 [ 1154.446695][T16699] IPVS: ftp: loaded support on port[0] = 21 [ 1154.587677][T16703] hfs: can't find a HFS filesystem on dev loop3 04:53:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000400)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x0, 0x0}) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xa) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f00000002c0)={0x0, 0x2, @stop_pts=0x1f}) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 04:53:28 executing program 0: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890c, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x24}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:53:28 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1155.058711][T16723] IPVS: ftp: loaded support on port[0] = 21 [ 1156.376129][T16717] bridge0: port 2(bridge_slave_1) entered disabled state [ 1156.383364][T16717] bridge0: port 1(bridge_slave_0) entered disabled state 04:53:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:31 executing program 3: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890c, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x24}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:53:31 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000067, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = syz_open_dev$cec(0x0, 0x2, 0x2) dup3(0xffffffffffffffff, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0xf039d8665c5467ec, 0x0, 0x3, 0x0, 0x45, 0x8000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cd8f990e64fffff6c7d04009e82100", 0x400, 0x9, 0x0, 0x10, 0x2}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000c01f000000f4ad75df548668ef277dad7b05761c5b5003207e03c59822f4ef57d3810acc2e034faf0200002e59f634edc5c448c1a87a6bbcba78989d5c520f5674a84eb1e29a115945ddca98f1fbbc7e583f0ffd18dd029486db6916f43644b7871bf40f49c0ff6c5b88b17f0706c4522051b614a6673c688b2f3eee5443481f13118e480c291df5192959f343ec85ea1685f7fcb7e9461a87beff15de9bb883d545140bafc23b7bffc42a5760d14f9c6ee712bb4ee676b320493fb22454f0044bd77d7ff378b15d"], 0xb) fallocate(r5, 0x3, 0x0, 0x8020003) lseek(r5, 0x0, 0x3) [ 1157.911894][T16834] IPVS: ftp: loaded support on port[0] = 21 04:53:31 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000067, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = syz_open_dev$cec(0x0, 0x2, 0x2) dup3(0xffffffffffffffff, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0xf039d8665c5467ec, 0x0, 0x3, 0x0, 0x45, 0x8000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cd8f990e64fffff6c7d04009e82100", 0x400, 0x9, 0x0, 0x10, 0x2}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000c01f000000f4ad75df548668ef277dad7b05761c5b5003207e03c59822f4ef57d3810acc2e034faf0200002e59f634edc5c448c1a87a6bbcba78989d5c520f5674a84eb1e29a115945ddca98f1fbbc7e583f0ffd18dd029486db6916f43644b7871bf40f49c0ff6c5b88b17f0706c4522051b614a6673c688b2f3eee5443481f13118e480c291df5192959f343ec85ea1685f7fcb7e9461a87beff15de9bb883d545140bafc23b7bffc42a5760d14f9c6ee712bb4ee676b320493fb22454f0044bd77d7ff378b15d"], 0xb) fallocate(r5, 0x3, 0x0, 0x8020003) lseek(r5, 0x0, 0x3) [ 1158.523922][T16834] chnl_net:caif_netlink_parms(): no params data found [ 1158.613735][T16834] bridge0: port 1(bridge_slave_0) entered blocking state [ 1158.636823][T16834] bridge0: port 1(bridge_slave_0) entered disabled state [ 1158.644755][T16834] device bridge_slave_0 entered promiscuous mode [ 1158.657586][T16834] bridge0: port 2(bridge_slave_1) entered blocking state [ 1158.664760][T16834] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.692327][T16834] device bridge_slave_1 entered promiscuous mode [ 1158.740010][T16834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1158.773439][T16834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1158.813546][T16834] team0: Port device team_slave_0 added [ 1158.830764][T16834] team0: Port device team_slave_1 added [ 1158.900772][T16834] device hsr_slave_0 entered promiscuous mode [ 1158.957990][T16834] device hsr_slave_1 entered promiscuous mode [ 1158.997479][T16834] debugfs: Directory 'hsr0' with parent '/' already present! [ 1159.140075][T16834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1159.161232][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1159.173701][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1159.188563][T16834] 8021q: adding VLAN 0 to HW filter on device team0 [ 1159.205623][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1159.214817][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1159.231275][ T8520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.238377][ T8520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1159.272826][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1159.281711][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1159.297716][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1159.315593][T15666] bridge0: port 2(bridge_slave_1) entered blocking state [ 1159.322693][T15666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1159.342835][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1159.361723][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1159.381060][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1159.399772][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1159.425800][T16834] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1159.445098][T16834] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1159.464653][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1159.473976][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1159.492530][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1159.510511][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1159.529053][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1159.545633][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1159.563202][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1159.585829][T16834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1159.604850][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1159.620129][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1159.643406][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1161.167482][T14768] device bridge_slave_1 left promiscuous mode [ 1161.173793][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.227702][T14768] device bridge_slave_0 left promiscuous mode [ 1161.233952][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.347185][T14768] device hsr_slave_0 left promiscuous mode [ 1161.387960][T14768] device hsr_slave_1 left promiscuous mode [ 1161.454801][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1161.465340][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1161.476631][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1161.511022][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1161.580576][T14768] bond0 (unregistering): Released all slaves [ 1165.288648][T16868] bridge0: port 2(bridge_slave_1) entered disabled state [ 1165.296375][T16868] bridge0: port 1(bridge_slave_0) entered disabled state 04:53:39 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) 04:53:39 executing program 3: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @empty}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x3, 0xe9a, 0xfc00}) ioctl$sock_inet_SIOCADDRT(r1, 0x890c, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x24}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) sendto$inet(r3, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af00320d4e16a3f9b188cf84dd974fa6ddafa55e15b4350a9dfbda4953fa3b4d1d79513adca774d389d9c7e1e9f0ce61e3ac0793522323331eca2d6fbc97ba6b237c4bf595dbff42f042cc16a88e3aa1ffdd8", 0x6b, 0x28080000, &(0x7f0000001280)={0x2, 0x4e22, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000012c0)) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r6, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setsig(r5, 0xa, 0x17) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:53:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xa) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f00000002c0)={0x0, 0x2, @stop_pts=0x1f}) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 04:53:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1166.743336][T16875] IPVS: ftp: loaded support on port[0] = 21 04:53:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) fcntl$getflags(0xffffffffffffffff, 0x0) 04:53:40 executing program 0: 04:53:40 executing program 0: 04:53:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xa) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f00000002c0)={0x0, 0x2, @stop_pts=0x1f}) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 04:53:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xa) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f00000002c0)={0x0, 0x2, @stop_pts=0x1f}) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) [ 1167.940031][T14768] device bridge_slave_1 left promiscuous mode [ 1167.946625][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.997549][T14768] device bridge_slave_0 left promiscuous mode [ 1168.003934][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.967114][T14768] device hsr_slave_0 left promiscuous mode [ 1169.016905][T14768] device hsr_slave_1 left promiscuous mode [ 1169.082907][T14768] team0 (unregistering): Port device team_slave_1 removed [ 1169.093401][T14768] team0 (unregistering): Port device team_slave_0 removed [ 1169.103959][T14768] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1169.190145][T14768] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1169.269627][T14768] bond0 (unregistering): Released all slaves [ 1169.410970][T16896] IPVS: ftp: loaded support on port[0] = 21 [ 1169.615584][T16896] chnl_net:caif_netlink_parms(): no params data found [ 1169.700788][T16896] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.722283][T16896] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.747565][T16896] device bridge_slave_0 entered promiscuous mode [ 1169.774406][T16896] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.800982][T16896] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.821271][T16896] device bridge_slave_1 entered promiscuous mode [ 1169.854277][T16900] IPVS: ftp: loaded support on port[0] = 21 [ 1169.854395][T16901] IPVS: ftp: loaded support on port[0] = 21 [ 1169.893693][T16896] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1169.914325][T16896] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1169.962772][T16896] team0: Port device team_slave_0 added [ 1169.989781][T16896] team0: Port device team_slave_1 added [ 1170.129494][T16896] device hsr_slave_0 entered promiscuous mode [ 1170.177268][T16896] device hsr_slave_1 entered promiscuous mode [ 1170.216847][T16896] debugfs: Directory 'hsr0' with parent '/' already present! [ 1170.284424][T16896] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.291505][T16896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.298872][T16896] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.305907][T16896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.373685][T16901] chnl_net:caif_netlink_parms(): no params data found [ 1170.418173][T16900] chnl_net:caif_netlink_parms(): no params data found [ 1170.438798][T16896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1170.450157][T15108] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.463028][T15108] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.492450][T16896] 8021q: adding VLAN 0 to HW filter on device team0 [ 1170.504979][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1170.512760][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1170.551609][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1170.567648][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1170.575976][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.583044][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.591103][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1170.600088][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1170.608486][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.615512][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.623451][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1170.632450][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1170.641418][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1170.649936][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1170.658942][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1170.667671][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1170.676152][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1170.684553][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1170.693281][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1170.712817][T16900] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.720291][T16900] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.733534][T16900] device bridge_slave_0 entered promiscuous mode [ 1170.741064][T16901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.748583][T16901] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.756290][T16901] device bridge_slave_0 entered promiscuous mode [ 1170.763998][T16901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.771106][T16901] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.779296][T16901] device bridge_slave_1 entered promiscuous mode [ 1170.786021][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1170.795036][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1170.805174][T16896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1170.813320][T16900] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.820732][T16900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.828883][T16900] device bridge_slave_1 entered promiscuous mode [ 1170.847903][T16900] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1170.863668][T16900] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1170.882082][T16901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1170.901368][T16900] team0: Port device team_slave_0 added [ 1170.914343][T16901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1170.924475][T16900] team0: Port device team_slave_1 added 04:53:44 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:44 executing program 0: [ 1170.962270][T16896] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1171.009054][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1171.020886][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1171.079641][T16900] device hsr_slave_0 entered promiscuous mode [ 1171.117276][T16900] device hsr_slave_1 entered promiscuous mode [ 1171.125714][T16911] IPVS: ftp: loaded support on port[0] = 21 [ 1171.157046][T16900] debugfs: Directory 'hsr0' with parent '/' already present! [ 1171.189297][T16901] team0: Port device team_slave_0 added [ 1171.198871][T16901] team0: Port device team_slave_1 added [ 1171.380317][T16901] device hsr_slave_0 entered promiscuous mode [ 1171.417935][T16901] device hsr_slave_1 entered promiscuous mode [ 1171.476838][T16901] debugfs: Directory 'hsr0' with parent '/' already present! 04:53:45 executing program 3: 04:53:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:45 executing program 0: [ 1171.653793][T16900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1171.681552][T16901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1171.734595][T16900] 8021q: adding VLAN 0 to HW filter on device team0 [ 1171.752451][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1171.766382][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1171.803445][T16901] 8021q: adding VLAN 0 to HW filter on device team0 [ 1171.811589][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1171.821119][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1171.830138][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1171.837222][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1171.845910][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1171.896045][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1171.912932][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.920214][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1171.934693][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1171.953822][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1171.977600][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1171.985713][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1172.004286][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1172.020702][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1172.029580][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1172.049709][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1172.058382][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1172.067624][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1172.076142][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1172.083362][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1172.091490][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1172.100297][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1172.109142][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1172.118168][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1172.126563][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1172.134044][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1172.141891][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1172.150523][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1172.159565][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1172.176399][T16900] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1172.188541][T16900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1172.199954][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1172.209261][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1172.217928][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1172.226602][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1172.241819][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1172.250965][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1172.270583][T16901] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1172.281327][T16901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1172.293688][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1172.302533][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1172.311457][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1172.320510][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1172.329055][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1172.337774][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1172.346335][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1172.355145][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1172.380250][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1172.388578][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1172.396033][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1172.403536][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1172.414076][T16901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1172.430372][T16900] 8021q: adding VLAN 0 to HW filter on device batadv0 04:53:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:53:46 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:46 executing program 3: 04:53:46 executing program 0: 04:53:46 executing program 0: [ 1173.492947][T16956] IPVS: ftp: loaded support on port[0] = 21 [ 1174.273201][T16946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1174.280477][T16946] bridge0: port 1(bridge_slave_0) entered disabled state 04:53:48 executing program 5: 04:53:48 executing program 3: 04:53:48 executing program 0: 04:53:49 executing program 0: 04:53:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x1c4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 04:53:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x1c4) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 04:53:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:53:50 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x1c4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 04:53:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="8ebf", 0x2, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xfdc8) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000080)=[{0x0}, {}], 0x2, &(0x7f0000001340)=""/4096, 0x1000}, 0x10000) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 04:53:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:53:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x1c4) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 04:53:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1177.404701][T16990] IPVS: ftp: loaded support on port[0] = 21 04:53:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x38}}, 0x0) 04:53:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) fcntl$getownex(r0, 0x24, &(0x7f000045fff8)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 04:53:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="8ebf3a", 0x3, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xfdc8) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000380)=""/83, 0x53}, {}], 0x3, &(0x7f0000001340)=""/4096, 0x1000}, 0x10000) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) [ 1177.895068][T17003] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 04:53:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {0x7fffffff}, 0x0, 0x0, 0x2}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x60, "e5ded35713882b9ed9bc5c5a1c66b92f789b133cc773ecd14dfa9409c75a3dcd1a150600"}}]}, 0x160}}, 0x0) 04:53:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="8ebf3a", 0x3, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xfdc8) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000380)=""/83, 0x53}, {}], 0x3, &(0x7f0000001340)=""/4096, 0x1000}, 0x10000) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) [ 1179.257999][ T28] device bridge_slave_1 left promiscuous mode [ 1179.264586][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1179.337874][ T28] device bridge_slave_0 left promiscuous mode [ 1179.346683][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 1179.418692][ T28] device bridge_slave_1 left promiscuous mode [ 1179.425066][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 1179.487545][ T28] device bridge_slave_0 left promiscuous mode [ 1179.494083][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 1180.347284][ T28] device hsr_slave_0 left promiscuous mode [ 1180.416986][ T28] device hsr_slave_1 left promiscuous mode [ 1180.463917][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1180.474779][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1180.485440][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1180.534951][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1180.610046][ T28] bond0 (unregistering): Released all slaves [ 1180.747171][ T28] device hsr_slave_0 left promiscuous mode [ 1180.796956][ T28] device hsr_slave_1 left promiscuous mode [ 1180.854122][ T28] team0 (unregistering): Port device team_slave_1 removed [ 1180.864859][ T28] team0 (unregistering): Port device team_slave_0 removed [ 1180.875523][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1180.940416][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1180.998602][ T28] bond0 (unregistering): Released all slaves [ 1181.114999][T17030] IPVS: ftp: loaded support on port[0] = 21 [ 1181.122231][T17032] IPVS: ftp: loaded support on port[0] = 21 [ 1181.210540][T17030] chnl_net:caif_netlink_parms(): no params data found [ 1181.280949][T17030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.288178][T17030] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.296218][T17030] device bridge_slave_0 entered promiscuous mode [ 1181.304027][T17030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.311867][T17030] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.320230][T17030] device bridge_slave_1 entered promiscuous mode [ 1181.377097][T17032] chnl_net:caif_netlink_parms(): no params data found [ 1181.449137][T17030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1181.477331][T17030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:53:54 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x60, "e5ded35713882b9ed9bc5c5a1c66b92f789b133cc773ecd14dfa9409c75a3dcd1a150600"}}]}, 0x160}}, 0x0) [ 1181.514094][T17030] team0: Port device team_slave_0 added [ 1181.524831][T17032] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.532371][T17032] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.545921][T17032] device bridge_slave_0 entered promiscuous mode [ 1181.573593][T17030] team0: Port device team_slave_1 added [ 1181.581388][T17032] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.607829][T17032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.616224][T17032] device bridge_slave_1 entered promiscuous mode [ 1181.720245][T17041] IPVS: ftp: loaded support on port[0] = 21 [ 1181.729540][T17030] device hsr_slave_0 entered promiscuous mode [ 1181.767859][T17030] device hsr_slave_1 entered promiscuous mode [ 1181.806817][T17030] debugfs: Directory 'hsr0' with parent '/' already present! [ 1181.816374][T17032] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1181.832670][T17032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1181.905789][T17032] team0: Port device team_slave_0 added [ 1181.934917][T17030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.942274][T17030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1181.949721][T17030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.956798][T17030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1181.966707][T17032] team0: Port device team_slave_1 added [ 1182.124909][T17032] device hsr_slave_0 entered promiscuous mode [ 1182.167248][T17032] device hsr_slave_1 entered promiscuous mode [ 1182.206876][T17032] debugfs: Directory 'hsr0' with parent '/' already present! [ 1182.239307][ T7885] bridge0: port 1(bridge_slave_0) entered disabled state [ 1182.248055][ T7885] bridge0: port 2(bridge_slave_1) entered disabled state [ 1182.310024][T17030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1182.342906][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1182.351092][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1182.364001][T17030] 8021q: adding VLAN 0 to HW filter on device team0 [ 1182.383843][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1182.393473][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1182.403099][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.410332][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.444463][T17032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1182.473019][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1182.482991][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1182.492329][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.499522][ T7904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.508963][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1182.532619][T17032] 8021q: adding VLAN 0 to HW filter on device team0 [ 1182.541281][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1182.551052][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1182.560106][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1182.570065][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1182.579325][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1182.588563][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1182.597546][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1182.606403][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1182.615343][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1182.624310][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1182.642155][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1182.651252][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1182.660110][T15028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.667556][T15028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.676129][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1182.685084][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1182.693799][T15028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.700857][T15028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.709135][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1182.719287][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1182.730188][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1182.738970][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1182.748582][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1182.766370][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1182.775739][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1182.784812][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1182.793954][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1182.803067][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1182.811625][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1182.819964][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1182.828723][ T7885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1182.839116][T17032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1182.848693][T17030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1182.857100][ T8520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1182.877096][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1182.884735][T15108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1182.899800][T17030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1182.911086][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1182.919912][T15028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1182.933529][T17032] 8021q: adding VLAN 0 to HW filter on device batadv0 04:53:56 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="8ebf", 0x2, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xfdc8) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000080)=[{0x0}, {}], 0x2, &(0x7f0000001340)=""/4096, 0x1000}, 0x10000) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 04:53:57 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:53:57 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000d1c000)=0x7, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000078c0), 0x10) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r2 = socket(0x0, 0x0, 0x0) bind(r2, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x40010102, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) 04:53:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x60, "e5ded35713882b9ed9bc5c5a1c66b92f789b133cc773ecd14dfa9409c75a3dcd1a150600"}}]}, 0x160}}, 0x0) 04:53:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:53:57 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:57 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='auxv\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4400ae8f, &(0x7f0000000140)) dup2(r3, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:53:57 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 1184.774231][T17102] IPVS: ftp: loaded support on port[0] = 21 04:53:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4400ae8f, &(0x7f0000000140)) dup2(r3, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:53:58 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) gettid() getpid() connect$inet6(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:53:58 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:53:58 executing program 3: clone(0x8201ffd, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000300)=0x40) 04:53:58 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:53:58 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) gettid() getpid() connect$inet6(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1185.665361][T17137] IPVS: ftp: loaded support on port[0] = 21 04:54:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:54:00 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:54:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4400ae8f, &(0x7f0000000140)) dup2(r3, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:54:00 executing program 0: clone(0x20001000000202, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000280)='./file1\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) 04:54:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x10000000003, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in=@empty, @in6=@rand_addr="5a8cecefe259c1c5f42326f37fbaa9f8", 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x6c}, 0x0, @in6=@dev}}, 0xe8) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @random="192bce5e2ffb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x12, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 04:54:00 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:54:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) [ 1187.155232][T17165] IPVS: ftp: loaded support on port[0] = 21 04:54:00 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) 04:54:00 executing program 5: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040), 0x0) unshare(0x40000000) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 04:54:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(0xffffffffffffffff) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 04:54:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 04:54:01 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket$nl_route(0x10, 0x3, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(r4, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) [ 1187.913061][T17201] IPVS: ftp: loaded support on port[0] = 21 [ 1188.497825][T17213] ================================================================== [ 1188.505987][T17213] BUG: KCSAN: data-race in ipip_tunnel_xmit / ipip_tunnel_xmit [ 1188.513529][T17213] [ 1188.515878][T17213] write to 0xffff888123f59138 of 8 bytes by task 17209 on cpu 0: [ 1188.523613][T17213] ipip_tunnel_xmit+0x28b/0x310 [ 1188.528469][T17213] dev_hard_start_xmit+0xef/0x430 [ 1188.533508][T17213] __dev_queue_xmit+0x14ab/0x1b40 [ 1188.538565][T17213] dev_queue_xmit+0x21/0x30 [ 1188.543078][T17213] neigh_direct_output+0x1f/0x30 [ 1188.548025][T17213] ip6_finish_output2+0x7a2/0xec0 [ 1188.553060][T17213] __ip6_finish_output+0x2d7/0x330 [ 1188.558180][T17213] ip6_finish_output+0x41/0x160 [ 1188.563038][T17213] ip6_output+0xf2/0x280 [ 1188.567296][T17213] ip6_local_out+0x74/0x90 [ 1188.571731][T17213] ip6_send_skb+0x53/0x110 [ 1188.576157][T17213] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 1188.581541][T17213] udpv6_sendmsg+0x1906/0x1c20 [ 1188.586308][T17213] inet6_sendmsg+0x6d/0x90 [ 1188.590739][T17213] sock_sendmsg+0x9f/0xc0 [ 1188.595084][T17213] ___sys_sendmsg+0x2b7/0x5d0 [ 1188.599769][T17213] __sys_sendmmsg+0x123/0x350 [ 1188.604460][T17213] __x64_sys_sendmmsg+0x64/0x80 [ 1188.609352][T17213] do_syscall_64+0xcc/0x370 [ 1188.613873][T17213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1188.619757][T17213] [ 1188.622110][T17213] read to 0xffff888123f59138 of 8 bytes by task 17213 on cpu 1: [ 1188.629788][T17213] ipip_tunnel_xmit+0x278/0x310 [ 1188.634654][T17213] dev_hard_start_xmit+0xef/0x430 [ 1188.639687][T17213] __dev_queue_xmit+0x14ab/0x1b40 [ 1188.644741][T17213] dev_queue_xmit+0x21/0x30 [ 1188.649252][T17213] neigh_direct_output+0x1f/0x30 [ 1188.654226][T17213] ip6_finish_output2+0x7a2/0xec0 [ 1188.659272][T17213] __ip6_finish_output+0x2d7/0x330 [ 1188.664405][T17213] ip6_finish_output+0x41/0x160 [ 1188.669267][T17213] ip6_output+0xf2/0x280 [ 1188.673521][T17213] ip6_local_out+0x74/0x90 [ 1188.677949][T17213] ip6_send_skb+0x53/0x110 [ 1188.682382][T17213] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 1188.687761][T17213] udpv6_sendmsg+0x1906/0x1c20 [ 1188.692527][T17213] inet6_sendmsg+0x6d/0x90 [ 1188.696945][T17213] sock_sendmsg+0x9f/0xc0 [ 1188.701307][T17213] ___sys_sendmsg+0x2b7/0x5d0 [ 1188.706090][T17213] __sys_sendmmsg+0x123/0x350 [ 1188.710780][T17213] __x64_sys_sendmmsg+0x64/0x80 [ 1188.715665][T17213] do_syscall_64+0xcc/0x370 [ 1188.720181][T17213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1188.726066][T17213] [ 1188.728391][T17213] Reported by Kernel Concurrency Sanitizer on: [ 1188.734560][T17213] CPU: 1 PID: 17213 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 1188.742655][T17213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.752732][T17213] ================================================================== [ 1188.760805][T17213] Kernel panic - not syncing: panic_on_warn set ... [ 1188.767406][T17213] CPU: 1 PID: 17213 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 1188.775296][T17213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.785356][T17213] Call Trace: [ 1188.788668][T17213] dump_stack+0xf5/0x159 [ 1188.792929][T17213] panic+0x210/0x640 [ 1188.796840][T17213] ? vprintk_func+0x8d/0x140 [ 1188.801453][T17213] kcsan_report.cold+0xc/0xe [ 1188.806068][T17213] kcsan_setup_watchpoint+0x3fe/0x410 [ 1188.811455][T17213] __tsan_read8+0x145/0x1f0 [ 1188.815969][T17213] ipip_tunnel_xmit+0x278/0x310 [ 1188.820838][T17213] dev_hard_start_xmit+0xef/0x430 [ 1188.825900][T17213] __dev_queue_xmit+0x14ab/0x1b40 [ 1188.830953][T17213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1188.837205][T17213] ? __this_cpu_preempt_check+0x4a/0x170 [ 1188.842854][T17213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1188.849101][T17213] ? netif_rx_ni+0xb7/0x290 [ 1188.853621][T17213] dev_queue_xmit+0x21/0x30 [ 1188.858140][T17213] neigh_direct_output+0x1f/0x30 [ 1188.863088][T17213] ip6_finish_output2+0x7a2/0xec0 [ 1188.868141][T17213] ? __rcu_read_unlock+0x66/0x3c0 [ 1188.873182][T17213] ? netif_rx_ni+0x290/0x290 [ 1188.877792][T17213] __ip6_finish_output+0x2d7/0x330 [ 1188.882945][T17213] ip6_finish_output+0x41/0x160 [ 1188.887809][T17213] ip6_output+0xf2/0x280 [ 1188.892204][T17213] ? __ip6_finish_output+0x330/0x330 [ 1188.897524][T17213] ip6_local_out+0x74/0x90 [ 1188.901968][T17213] ip6_send_skb+0x53/0x110 [ 1188.906399][T17213] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 1188.911799][T17213] udpv6_sendmsg+0x1906/0x1c20 [ 1188.916583][T17213] ? __perf_event_task_sched_in+0x14d/0x390 [ 1188.922485][T17213] ? ip_reply_glue_bits+0xb0/0xb0 [ 1188.927542][T17213] ? __schedule+0x319/0x640 [ 1188.932083][T17213] inet6_sendmsg+0x6d/0x90 [ 1188.936641][T17213] ? inet6_sendmsg+0x6d/0x90 [ 1188.941269][T17213] ? inet6_ioctl+0x140/0x140 [ 1188.945870][T17213] sock_sendmsg+0x9f/0xc0 [ 1188.950223][T17213] ___sys_sendmsg+0x2b7/0x5d0 [ 1188.954931][T17213] ? __schedule+0x319/0x640 [ 1188.959446][T17213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1188.965696][T17213] ? debug_smp_processor_id+0x4c/0x172 [ 1188.971344][T17213] ? delay_tsc+0x8f/0xc0 [ 1188.975592][T17213] ? __const_udelay+0x36/0x40 [ 1188.980267][T17213] ? __udelay+0x10/0x20 [ 1188.984432][T17213] __sys_sendmmsg+0x123/0x350 [ 1188.989117][T17213] ? __read_once_size+0x5a/0xe0 [ 1188.993967][T17213] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1188.999705][T17213] ? _copy_to_user+0x84/0xb0 [ 1189.004302][T17213] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1189.010544][T17213] ? put_timespec64+0x94/0xc0 [ 1189.015226][T17213] __x64_sys_sendmmsg+0x64/0x80 [ 1189.020078][T17213] do_syscall_64+0xcc/0x370 [ 1189.024584][T17213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1189.030467][T17213] RIP: 0033:0x45a219 [ 1189.034504][T17213] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1189.054299][T17213] RSP: 002b:00007f311caeac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1189.062716][T17213] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a219 [ 1189.070683][T17213] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000007 [ 1189.078651][T17213] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1189.086702][T17213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f311caeb6d4 [ 1189.094669][T17213] R13: 00000000004c7f9d R14: 00000000004de3c8 R15: 00000000ffffffff [ 1189.104107][T17213] Kernel Offset: disabled [ 1189.108493][T17213] Rebooting in 86400 seconds..