0000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1227.326907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16400 sclass=netlink_route_socket pig=17796 comm=syz-executor.1 [ 1227.381413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16400 sclass=netlink_route_socket pig=17803 comm=syz-executor.1 23:25:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:25:48 executing program 4: unshare(0x40000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") pipe(0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r7}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r7, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e21, 0x7fffffff, @remote, 0x4}}, [0xffffffffffffff00, 0x3, 0x81, 0x9, 0x8, 0x0, 0x0, 0xfffffffffffff950, 0xfffffffffffff800, 0x6, 0xff, 0x3, 0x6, 0x80, 0x3f]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r8, 0x8000, 0x7, 0x7}, &(0x7f00000001c0)=0x10) 23:25:48 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5654}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x4000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000000, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) [ 1227.750130] net_ratelimit: 28 callbacks suppressed [ 1227.750136] protocol 88fb is buggy, dev hsr_slave_0 [ 1227.760261] protocol 88fb is buggy, dev hsr_slave_1 23:25:48 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5654}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x4000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000000, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) [ 1227.829115] IPVS: ftp: loaded support on port[0] = 21 23:25:49 executing program 2: open(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="2c917052ff1d5169ba55d509dfb0f6764bb924ca18d09623000000dec24036adac293fe667552167a9ce22760155d48b036855808643346b9466382f02ce483923213f4bcbf5d554f684dfeb600afbf1f49a73760e35360720d83e0425f5bd9a2c7c6e942bde17bf26e7d69d3ab856a7b4850d2d8b027390a339e13f677687c5b654efd3a4ca0bd08c346b88ae574dca6932296717963cf09d3863e74567e776ec3ea62e130bab65c316d69574ae7919bd3c7fa181a1656c0a88172092fc17d592974260e32c84db39f4365161ce48568510a0c1d88720ba06643291ced2"], 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) read$alg(r3, &(0x7f0000000300)=""/56, 0x38) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc074510c, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000001, 0x34d201) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0x124, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0x4, 0x2}}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x71, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x5899, 0x699, 0x0, 0x7, 0xcd, 0x9, 0xffffffffffffff47, 0x0, 0x7, 0xd92, 0xff, 0x0, 0x20, 0x8]}, &(0x7f0000000000)=0x100) accept$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r9, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r10, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 23:25:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3ff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x10, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f00000001c0)=ANY=[@ANYRES16=r6]}) dup2(r4, r6) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000200)=""/84, 0x54}, {&(0x7f00000002c0)=""/118, 0x76}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000001340)=""/82, 0x52}, {&(0x7f00000013c0)=""/114, 0x72}], 0x6, &(0x7f0000003040)=""/4096, 0x1000}, 0x40) dup3(r8, r7, 0x180000) 23:25:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) lseek(r1, 0x8, 0x1) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) accept4(r3, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80, 0x80800) ftruncate(r2, 0x1000000) sendfile(r0, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 23:25:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f035000c803cf", 0x2f}], 0xaaaaaaaaaaaad09, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_open_procfs$namespace(0x0, &(0x7f0000000800)='ns/pid\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semget(0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000340)={0x8001, 0xd1f}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000980)={0x0, &(0x7f0000000940)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0x0, 0xba8e}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000440)={{0xa, 0x4e20, 0x1f, @loopback}, {0xa, 0x4e24, 0x0, @local}, 0x1000, [0x7, 0x800, 0xfffff785, 0x10001, 0xffff, 0x43ff, 0x4, 0x4]}, 0x5c) add_key$user(0x0, 0x0, &(0x7f0000000700)="e1938f35059997f19264f98cf35be1dcd665bb8f3224d0300c5c42dec6843d0c7ab6562804affea41779300b141e606844a5f499cde432660554e79da6926fb43d8b462a70a91e4a8011ab9e076ecc19ff0ad9a7199f38f1b42737f98443805079a1cf5d8e197a7f34a67da5761a154976b20f54d4d106e32c281ea93dfd82b1f5a1c2767cb47da333ff9658ec4ead10933c14bd", 0x94, 0x0) keyctl$revoke(0x3, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000100)=""/36, 0x24, 0x1, 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f00000009c0)=""/240, 0xf0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x6, &(0x7f00000001c0)=[{0x9, 0x3f, 0x0, 0x6}]}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000500)) socket$inet6(0xa, 0x0, 0x6b) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x0, 0x10001}, &(0x7f0000000240)=0xc) [ 1228.391048] protocol 88fb is buggy, dev hsr_slave_0 [ 1228.396937] protocol 88fb is buggy, dev hsr_slave_1 23:25:49 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:25:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:25:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1228.630406] protocol 88fb is buggy, dev hsr_slave_0 [ 1228.635530] protocol 88fb is buggy, dev hsr_slave_1 23:25:49 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0_to_bridge\x00'}, 0x18) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x401, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000300)={0x6, @capture={0x1000, 0x2, {0x3f, 0x4}, 0x80}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a", 0x37, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0xb) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r3 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$TIOCCBRK(r3, 0x5428) r4 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, r4) r5 = socket$inet(0x2, 0x2, 0x0) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETXF(r6, 0x5434, &(0x7f0000000140)={0x8, 0x1, [0xdfc, 0x2, 0x8000, 0x2, 0x111e], 0xfff9}) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$SIOCX25GFACILITIES(r7, 0x89e2, 0x0) 23:25:49 executing program 4: unshare(0x40000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") pipe(0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r7}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r7, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e21, 0x7fffffff, @remote, 0x4}}, [0xffffffffffffff00, 0x3, 0x81, 0x9, 0x8, 0x0, 0x0, 0xfffffffffffff950, 0xfffffffffffff800, 0x6, 0xff, 0x3, 0x6, 0x80, 0x3f]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r8, 0x8000, 0x7, 0x7}, &(0x7f00000001c0)=0x10) [ 1228.870224] protocol 88fb is buggy, dev hsr_slave_0 [ 1228.875353] protocol 88fb is buggy, dev hsr_slave_1 [ 1228.885044] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0_to_bridge, syncid = 0, id = 0 23:25:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:25:50 executing program 2: open(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="2c917052ff1d5169ba55d509dfb0f6764bb924ca18d09623000000dec24036adac293fe667552167a9ce22760155d48b036855808643346b9466382f02ce483923213f4bcbf5d554f684dfeb600afbf1f49a73760e35360720d83e0425f5bd9a2c7c6e942bde17bf26e7d69d3ab856a7b4850d2d8b027390a339e13f677687c5b654efd3a4ca0bd08c346b88ae574dca6932296717963cf09d3863e74567e776ec3ea62e130bab65c316d69574ae7919bd3c7fa181a1656c0a88172092fc17d592974260e32c84db39f4365161ce48568510a0c1d88720ba06643291ced2"], 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) read$alg(r3, &(0x7f0000000300)=""/56, 0x38) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc074510c, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000001, 0x34d201) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0x124, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0x4, 0x2}}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x71, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x5899, 0x699, 0x0, 0x7, 0xcd, 0x9, 0xffffffffffffff47, 0x0, 0x7, 0xd92, 0xff, 0x0, 0x20, 0x8]}, &(0x7f0000000000)=0x100) accept$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r9, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r10, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) [ 1228.950136] protocol 88fb is buggy, dev hsr_slave_0 [ 1228.955368] protocol 88fb is buggy, dev hsr_slave_1 23:25:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:25:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:25:50 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x8004, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f00000000c0)=ANY=[]) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x107, 0xff, "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"}, &(0x7f0000000380), 0x400) readahead(r0, 0x2, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$lock(r2, 0x25, &(0x7f00000003c0)={0x2, 0x0, 0x10001, 0x900000, r3}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000180)={0x3, [0x8001, 0x3f6, 0xffd]}, &(0x7f0000000140)=0xa) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x8086, 0x7) 23:25:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:25:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\xfc\xff\xff\xffSb\xb0\xee\xb0< f\xb7\xc3\xfd0U\xedWM\xff\x7f\x88\xa2\xf4V~\x81U\xea\xfb\xcf\xef\xb3\xf8\xf2\xb5\x98\xe5\x93~z\xa3\x17\xb2\xb0#]Z\x80\xb0\xef\x84\xe3[\a\x00\xb9\x9c\xa7@\x91\xbbq0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10200, 0x1, 0xf000, 0x1000, &(0x7f000000d000/0x1000)=nil}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) lstat(0x0, 0x0) 23:25:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x20000) write$P9_RLINK(r2, &(0x7f00000001c0)={0x7, 0x47, 0x2}, 0x7) r3 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0xa0102) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000540)={@rand_addr="a469d5c0edcb32b081f7fedacaa6e753", r4}, 0x14) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a647", 0xb, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r5}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 23:25:50 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f00000000c0)=0xb05b) r3 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r3, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0xd259df7cb461c8ad) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) perf_event_open$cgroup(&(0x7f00000001c0)={0xe8d3b50e9fa19c6b, 0x70, 0x81, 0x4, 0x2, 0x8, 0x0, 0x1, 0x2000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x310a4, 0x0, 0xfffffffe, 0x8, 0x4, 0x9, 0x2}, r7, 0xd, r10, 0x4) ioctl$VIDIOC_S_DV_TIMINGS(r5, 0xc0845657, &(0x7f0000000340)={0x0, @bt={0x8001, 0xffffffe1, 0x0, 0x3, 0x80000001, 0x200, 0x2e1, 0x80000001, 0xc, 0x3c6, 0x2, 0x2, 0x10001, 0x136c2076, 0x18, 0x1a}}) r11 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r11, 0x0, 0x200000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x2000, 0x0) 23:25:51 executing program 2: open(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="2c917052ff1d5169ba55d509dfb0f6764bb924ca18d09623000000dec24036adac293fe667552167a9ce22760155d48b036855808643346b9466382f02ce483923213f4bcbf5d554f684dfeb600afbf1f49a73760e35360720d83e0425f5bd9a2c7c6e942bde17bf26e7d69d3ab856a7b4850d2d8b027390a339e13f677687c5b654efd3a4ca0bd08c346b88ae574dca6932296717963cf09d3863e74567e776ec3ea62e130bab65c316d69574ae7919bd3c7fa181a1656c0a88172092fc17d592974260e32c84db39f4365161ce48568510a0c1d88720ba06643291ced2"], 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) read$alg(r3, &(0x7f0000000300)=""/56, 0x38) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc074510c, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000001, 0x34d201) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0x124, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0x4, 0x2}}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x71, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x5899, 0x699, 0x0, 0x7, 0xcd, 0x9, 0xffffffffffffff47, 0x0, 0x7, 0xd92, 0xff, 0x0, 0x20, 0x8]}, &(0x7f0000000000)=0x100) accept$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r9, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r10, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 23:25:51 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x0, 0x803, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x80800, 0xe) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40008001}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT], 0x4, r2) r7 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x10) socket(0x0, 0x0, 0x0) [ 1230.490471] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.499063] bridge0: port 1(bridge_slave_0) entered disabled state 23:25:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000000c0)={0x7, 0x7, 0x5c}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = getpgid(r3) sched_setparam(r4, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:25:51 executing program 4: clone(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="a0de925b340900c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3b0454ceb68c0e6f7410adc9f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfd}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f00000004c0)="719c3087b4ab1824a1fb8ed82f3a213b6a885cb4b6241bf2b735b08502c09c588d6b852a3e8e555f6bcd427b0000000000009d94d5f68b9b1d4eaa02eba8c1a48848c974b30bcec1f072157e938d8fb283cad2e1922a26cbb0212363fd32ac73b159d87fdd078f", 0x41395788) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x40000, 0x0) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000640)={0x0, 0x2}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x1800) perf_event_open(&(0x7f0000000540)={0x22b7d6ec3bad3369, 0x70, 0x3, 0x0, 0x6, 0x9, 0x0, 0x439f, 0x1000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8}, 0x12000, 0x3, 0x36, 0x0, 0x1c, 0xffff}, r0, 0x7, r6, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0xff, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x6}, 0xd00, 0x0, 0xf56f, 0x2, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) socket$inet6(0xa, 0x80002, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) r7 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4f36213db16b5b49}, {0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x33}, 0x0, @in6=@mcast2, 0x3505, 0x0, 0x0, 0x6, 0x0, 0xfffffffe}}, 0xe8) socket$can_raw(0x1d, 0x3, 0x1) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0) sendto$inet6(r7, 0x0, 0xfffffffffffffe82, 0x400c00e, 0x0, 0xfffffffffffffdb3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x100) [ 1230.923686] Unknown ioctl 1074795139 [ 1232.041485] IPVS: ftp: loaded support on port[0] = 21 [ 1232.790175] net_ratelimit: 16 callbacks suppressed [ 1232.790180] protocol 88fb is buggy, dev hsr_slave_0 [ 1232.795212] protocol 88fb is buggy, dev hsr_slave_1 [ 1232.895819] chnl_net:caif_netlink_parms(): no params data found [ 1232.944052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1232.955630] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.962790] device bridge_slave_0 entered promiscuous mode [ 1232.969901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1232.981311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.989016] device bridge_slave_1 entered promiscuous mode [ 1233.006865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1233.017638] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1233.037865] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1233.040124] protocol 88fb is buggy, dev hsr_slave_0 [ 1233.045305] team0: Port device team_slave_0 added [ 1233.049761] protocol 88fb is buggy, dev hsr_slave_1 [ 1233.055530] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1233.067056] team0: Port device team_slave_1 added [ 1233.075842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1233.083858] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1233.132828] device hsr_slave_0 entered promiscuous mode [ 1233.180457] device hsr_slave_1 entered promiscuous mode [ 1233.190133] protocol 88fb is buggy, dev hsr_slave_0 [ 1233.195208] protocol 88fb is buggy, dev hsr_slave_1 [ 1233.255294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1233.262506] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1233.279548] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.308781] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1233.315036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1233.324793] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1233.336438] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1233.343223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1233.351023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1233.361396] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1233.367470] 8021q: adding VLAN 0 to HW filter on device team0 [ 1233.379628] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1233.387599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1233.395476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1233.403163] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.409604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1233.417073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1233.428767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1233.436136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1233.444101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1233.451801] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.458254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.471794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1233.480259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1233.488991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1233.497264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1233.510066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1233.517661] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1233.534686] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1233.545504] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1233.556002] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1233.563329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1233.571163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1233.578628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1233.589580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1233.606759] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1233.614263] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1233.621138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1233.627877] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1233.642927] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1233.680400] protocol 88fb is buggy, dev hsr_slave_0 [ 1233.685518] protocol 88fb is buggy, dev hsr_slave_1 [ 1233.800178] protocol 88fb is buggy, dev hsr_slave_0 [ 1233.805289] protocol 88fb is buggy, dev hsr_slave_1 [ 1234.010202] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1234.223478] device bridge_slave_1 left promiscuous mode [ 1234.229795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.286614] device bridge_slave_0 left promiscuous mode [ 1234.294279] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.352470] batman_adv: batadv0: Removing interface: veth3 [ 1234.366118] batman_adv: batadv0: Removing interface: veth5 [ 1234.373878] device bridge_slave_1 left promiscuous mode [ 1234.379457] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.420863] device bridge_slave_0 left promiscuous mode [ 1234.426493] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.523480] device hsr_slave_1 left promiscuous mode [ 1234.574672] device hsr_slave_0 left promiscuous mode [ 1234.655094] team0 (unregistering): Port device team_slave_1 removed [ 1234.665539] team0 (unregistering): Port device team_slave_0 removed [ 1234.676842] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1234.716260] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1234.798097] bond0 (unregistering): Released all slaves [ 1234.857970] bond1 (unregistering): Released all slaves [ 1234.922216] device hsr_slave_1 left promiscuous mode [ 1234.974713] device hsr_slave_0 left promiscuous mode [ 1235.023415] team0 (unregistering): Port device team_slave_1 removed [ 1235.035920] team0 (unregistering): Port device team_slave_0 removed [ 1235.048112] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1235.138784] bond0 (unregistering): Released all slaves 23:25:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:25:56 executing program 4: clone(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="a0de925b340900c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3b0454ceb68c0e6f7410adc9f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfd}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f00000004c0)="719c3087b4ab1824a1fb8ed82f3a213b6a885cb4b6241bf2b735b08502c09c588d6b852a3e8e555f6bcd427b0000000000009d94d5f68b9b1d4eaa02eba8c1a48848c974b30bcec1f072157e938d8fb283cad2e1922a26cbb0212363fd32ac73b159d87fdd078f", 0x41395788) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x40000, 0x0) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000640)={0x0, 0x2}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x1800) perf_event_open(&(0x7f0000000540)={0x22b7d6ec3bad3369, 0x70, 0x3, 0x0, 0x6, 0x9, 0x0, 0x439f, 0x1000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8}, 0x12000, 0x3, 0x36, 0x0, 0x1c, 0xffff}, r0, 0x7, r6, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0xff, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x6}, 0xd00, 0x0, 0xf56f, 0x2, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) socket$inet6(0xa, 0x80002, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) r7 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4f36213db16b5b49}, {0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x33}, 0x0, @in6=@mcast2, 0x3505, 0x0, 0x0, 0x6, 0x0, 0xfffffffe}}, 0xe8) socket$can_raw(0x1d, 0x3, 0x1) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0) sendto$inet6(r7, 0x0, 0xfffffffffffffe82, 0x400c00e, 0x0, 0xfffffffffffffdb3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x100) 23:25:56 executing program 5: clone(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="a0de925b340900c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3b0454ceb68c0e6f7410adc9f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfd}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f00000004c0)="719c3087b4ab1824a1fb8ed82f3a213b6a885cb4b6241bf2b735b08502c09c588d6b852a3e8e555f6bcd427b0000000000009d94d5f68b9b1d4eaa02eba8c1a48848c974b30bcec1f072157e938d8fb283cad2e1922a26cbb0212363fd32ac73b159d87fdd078f", 0x41395788) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x40000, 0x0) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000640)={0x0, 0x2}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x1800) perf_event_open(&(0x7f0000000540)={0x22b7d6ec3bad3369, 0x70, 0x3, 0x0, 0x6, 0x9, 0x0, 0x439f, 0x1000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8}, 0x12000, 0x3, 0x36, 0x0, 0x1c, 0xffff}, r0, 0x7, r6, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0xff, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x6}, 0xd00, 0x0, 0xf56f, 0x2, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) socket$inet6(0xa, 0x80002, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) r7 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4f36213db16b5b49}, {0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x33}, 0x0, @in6=@mcast2, 0x3505, 0x0, 0x0, 0x6, 0x0, 0xfffffffe}}, 0xe8) socket$can_raw(0x1d, 0x3, 0x1) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0) sendto$inet6(r7, 0x0, 0xfffffffffffffe82, 0x400c00e, 0x0, 0xfffffffffffffdb3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x100) 23:25:56 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f00000004c0)=""/143, 0x8f}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) tkill(r0, 0x1000000000016) 23:25:56 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) 23:25:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) r3 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000280)=@ipmr_newroute={0x148, 0x18, 0x800, 0x70bd28, 0x25dfdbfd, {0x80, 0xe828090c0f1e9f9d, 0x10, 0x5, 0xfe, 0x2, 0xfd, 0x3, 0xac03199b3e1745b}, [@RTA_MULTIPATH={0xc, 0x9, {0x3, 0x3f, 0x81}}, @RTA_OIF={0x8, 0x4, r2}, @RTA_MARK={0x8, 0x10, 0x8}, @RTA_PRIORITY={0x8, 0x6, 0x81}, @RTA_PRIORITY={0x8, 0x6, 0x7}, @RTA_METRICS={0x68, 0x8, "c559b4fbd00a7acb92feb2507f25c5584360055f0fe69801103752b4d69d97eb57d8ac1aef5e76dbeedaa9497c8aa2972bf48f723837cbefa9c74b753d45f8f8913b079aba894276ca825f6baae0521a5ffb1e54158b529345f50d434f9aaa4d07fefa"}, @RTA_IIF={0x8, 0x1, r5}, @RTA_METRICS={0x88, 0x8, "f7537f4502399f9e9203f0ffa51984c00408c49a5faa05c116f9a20eea44bc8e21340213060a120baf935acbe6704eb59e202674fa08d78d9a299f7b7ca8035a5681b6c9d027b75d723073a4423598d7952594f204e296c5101ac3695f92738045e5ed2c4fe3d028aa8bbf9875d34bf291beebb27cb413beb535749ee1ad7f5e37dc74"}, @RTA_OIF={0x8, 0x4, r6}]}, 0x148}}, 0x0) 23:25:56 executing program 3: socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xf, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x2, 0x0, 0x5, 0x0, 0xffff, 0xfffffffffffffffe}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x0) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000580)) socket$inet6(0xa, 0x80006, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$tun(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000001ff7f00000000000049140044000000001f009078ffffffff46ac1414aa070f00e0000001ac141400ffffffff00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYRESHEX], 0x4) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f00000000c0)={0x7}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 23:25:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1235.514719] Unknown ioctl 1074795139 23:25:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:25:56 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb) clone(0x4010400, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r6}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r6, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={r6, 0xffff8000, 0x8}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r7 = dup(r1) unlinkat(r7, &(0x7f0000000000)='./file0\x00', 0x300) 23:25:57 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) pipe(&(0x7f0000000140)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x10000, 0x4) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r2, 0x8) accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file1\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x2) read$FUSE(r0, 0x0, 0x0) 23:25:57 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) 23:25:57 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x80800, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x3}, 0x1, 0x0, 0x0, 0x40008001}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ee00000022002907fffffffffff900000600000014001100fe80000000f3000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000480)={0x30, r7, 0x805, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x14, 0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x22040084}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r7, 0x20, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x2020880) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet6(0xa, 0x800000003, 0xff) syz_genetlink_get_family_id$devlink(&(0x7f0000000340)='devlink\x00') connect$inet6(r9, &(0x7f0000000000), 0x1c) dup(r9) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001080000000000000000cc021d16b6501fd0e9b6c2fb7d9400000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) mknodat(r10, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x5) socket(0x0, 0x0, 0x0) [ 1236.512985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:25:57 executing program 4: sched_setattr(0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0xe, &(0x7f0000000280)={0x7, 0x89}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(&(0x7f00000001c0)='./file1\x00') r5 = socket$inet(0x2, 0x403, 0x4) ioctl$sock_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000002a40)) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcbf84a17f6e00836}, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r7, 0x4010ae74, &(0x7f0000000100)={0x2dee6690, 0x2, 0xcc07}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/493], 0x101}}], 0x1, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r8, 0x0, 0x0) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x16, &(0x7f00000002c0)) ptrace(0x10, r9) ptrace$pokeuser(0x6, r9, 0x388, 0xfffffffffffffffe) [ 1238.150123] net_ratelimit: 26 callbacks suppressed [ 1238.150129] protocol 88fb is buggy, dev hsr_slave_0 [ 1238.160111] protocol 88fb is buggy, dev hsr_slave_0 [ 1238.160287] protocol 88fb is buggy, dev hsr_slave_1 [ 1238.165268] protocol 88fb is buggy, dev hsr_slave_1 [ 1238.730946] IPVS: ftp: loaded support on port[0] = 21 [ 1238.790185] protocol 88fb is buggy, dev hsr_slave_0 [ 1238.795424] protocol 88fb is buggy, dev hsr_slave_1 [ 1239.030167] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.035288] protocol 88fb is buggy, dev hsr_slave_1 [ 1239.270182] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.275415] protocol 88fb is buggy, dev hsr_slave_1 [ 1239.597114] chnl_net:caif_netlink_parms(): no params data found [ 1239.640742] bridge0: port 1(bridge_slave_0) entered blocking state [ 1239.647450] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.654687] device bridge_slave_0 entered promiscuous mode [ 1239.662389] bridge0: port 2(bridge_slave_1) entered blocking state [ 1239.668808] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.676191] device bridge_slave_1 entered promiscuous mode [ 1239.699822] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1239.709572] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1239.733078] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1239.740439] team0: Port device team_slave_0 added [ 1239.746226] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1239.754078] team0: Port device team_slave_1 added [ 1239.759713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1239.767493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1239.832495] device hsr_slave_0 entered promiscuous mode [ 1239.870406] device hsr_slave_1 entered promiscuous mode [ 1239.956920] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1239.965178] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1239.979368] bridge0: port 2(bridge_slave_1) entered blocking state [ 1239.985869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1239.992522] bridge0: port 1(bridge_slave_0) entered blocking state [ 1239.998898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1240.031536] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1240.037663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1240.049920] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1240.058845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1240.066126] bridge0: port 1(bridge_slave_0) entered disabled state [ 1240.073125] bridge0: port 2(bridge_slave_1) entered disabled state [ 1240.083623] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1240.089833] 8021q: adding VLAN 0 to HW filter on device team0 [ 1240.111867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1240.119691] bridge0: port 1(bridge_slave_0) entered blocking state [ 1240.126104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1240.141696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1240.149483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1240.156024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1240.177680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1240.185546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1240.196290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1240.204115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1240.212401] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1240.225443] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1240.231804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1240.246556] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1240.254147] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1240.261806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1240.277065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1240.590738] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1240.760218] IPVS: stopping backup sync thread 17885 ... [ 1240.800580] device bridge_slave_1 left promiscuous mode [ 1240.806095] bridge0: port 2(bridge_slave_1) entered disabled state [ 1240.860945] device bridge_slave_0 left promiscuous mode [ 1240.866651] bridge0: port 1(bridge_slave_0) entered disabled state [ 1240.911843] device bridge_slave_1 left promiscuous mode [ 1240.917336] bridge0: port 2(bridge_slave_1) entered disabled state [ 1240.974187] device bridge_slave_0 left promiscuous mode [ 1240.980532] bridge0: port 1(bridge_slave_0) entered disabled state [ 1240.989779] Unknown ioctl 1074795139 [ 1241.193978] device hsr_slave_1 left promiscuous mode [ 1241.233338] device hsr_slave_0 left promiscuous mode [ 1241.273509] team0 (unregistering): Port device team_slave_1 removed [ 1241.284828] team0 (unregistering): Port device team_slave_0 removed [ 1241.294743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1241.355257] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1241.426293] bond0 (unregistering): Released all slaves [ 1241.503066] device hsr_slave_1 left promiscuous mode [ 1241.544666] device hsr_slave_0 left promiscuous mode [ 1241.593966] team0 (unregistering): Port device team_slave_1 removed [ 1241.605554] team0 (unregistering): Port device team_slave_0 removed [ 1241.615785] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1241.653875] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1241.725181] bond0 (unregistering): Released all slaves 23:26:02 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) 23:26:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x8}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, 0x0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x1f) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7f, 0x30000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext={0x1671, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x2) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x4) ioctl(r6, 0x0, &(0x7f0000000180)) write(r4, &(0x7f00000003c0)="e098fb47b03f508f8ba5a9cb605ef907d070a3d72a3613eadeabe6c3bddab8f347be03571c52ed4dd40dc5143b6c4a2d735f99be1c0f13ea7f0fde471b46a7610f916dc4a2059900e00cbd74dd09b1c3ba4dcd06b38c7fb56cf13b19f2218d737364e05120ede8d57321123852fbe3f638636330f2d960e9bb947816e445b8d00ea7bdf4aada4da5c10ffc61219acd92ba835655cad91c9603f839bf9f47faa39488f4f89ad73fa7576a51bed983f5309c0b7cef6bcf261c8049884d5a67e4cb8b8c7debf282b7d9a5dc4660e7c3e9c3a3fcdf590d4582625b24be", 0xdb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 23:26:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x80800, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x3}, 0x1, 0x0, 0x0, 0x40008001}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ee00000022002907fffffffffff900000600000014001100fe80000000f3000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000480)={0x30, r7, 0x805, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x14, 0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x22040084}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r7, 0x20, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x2020880) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet6(0xa, 0x800000003, 0xff) syz_genetlink_get_family_id$devlink(&(0x7f0000000340)='devlink\x00') connect$inet6(r9, &(0x7f0000000000), 0x1c) dup(r9) ftruncate(0xffffffffffffffff, 0x2007fff) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001080000000000000000cc021d16b6501fd0e9b6c2fb7d9400000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) mknodat(r10, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x5) socket(0x0, 0x0, 0x0) 23:26:02 executing program 4: sched_setattr(0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0xe, &(0x7f0000000280)={0x7, 0x89}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(&(0x7f00000001c0)='./file1\x00') r5 = socket$inet(0x2, 0x403, 0x4) ioctl$sock_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000002a40)) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xcbf84a17f6e00836}, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r7, 0x4010ae74, &(0x7f0000000100)={0x2dee6690, 0x2, 0xcc07}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="139e094a0000002099b7744307f631cd168c6337e4fa414f890dc5b71c64f21f4b3a77d0f8abb4cafe6f1c07c7edc5faa88086d871aa7fff6c2415c8e8cc590000002a9375c171e273781507dd0181a7ec64e30000987983fb96fcef527c8060ece0308835ac207c0340ecaf2caea3048cebb0e7a9acf652095a2f771e84264dd918d6db80f5847360bfd428db73d8eefda5ac99f51e756592cc1c4f1d2aded694ece37c5234f524bfae01899e6f2749733e9549d8266243537d6b8ae5014a357191b9d5e60000878903b0d83b69d09f0000000000eca100000058f0e8824066615480ff585052cdb19aba6a76b620c8fdd55f14af00000100000000b7d0c77e90d757f29f5de0fd2c2896ac9694f041d7593048e08ac36b691f629e461294e245b19a7b768bc5b09b82bb15b35fa561e17e9b54478151f5d785d0a42426da8472009c7fd8af5a5fd78d70318e53cd3979c2db259a2c12e8595a01d9d72a2ea5240a974996785cd1b8f806a51e36888293e9aa1e8a9338c070b14060a170aa14b7ed9cbffb4ebb0c383304fbc99f6d3c7050f3d3867b1d4099cf4e2d5e4b2c65c186e0f0ac761ac6070f49f96ef91b6be4ce441e0ebd989ffdd37f38d7ca31918d6793862c3be30c9961b0ee9c5bab5cab1a8604f36bd7c7e267faf600"/493], 0x101}}], 0x1, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r8, 0x0, 0x0) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x16, &(0x7f00000002c0)) ptrace(0x10, r9) ptrace$pokeuser(0x6, r9, 0x388, 0xfffffffffffffffe) 23:26:02 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) 23:26:03 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x91) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) syz_open_dev$usbfs(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2, 0xffffffffffffffff) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f00000000c0)={"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"}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="e1000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000500)={0x0, @in={{0x2, 0x0, @local}}}, 0x90) ioctl$KVM_SET_MP_STATE(r7, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 1242.357425] kvm: vcpu 0: requested 128 ns lapic timer period limited to 500000 ns [ 1243.190169] net_ratelimit: 26 callbacks suppressed [ 1243.190175] protocol 88fb is buggy, dev hsr_slave_0 [ 1243.200292] protocol 88fb is buggy, dev hsr_slave_1 [ 1243.430174] protocol 88fb is buggy, dev hsr_slave_0 [ 1243.436239] protocol 88fb is buggy, dev hsr_slave_1 [ 1243.590148] protocol 88fb is buggy, dev hsr_slave_0 [ 1243.595469] protocol 88fb is buggy, dev hsr_slave_1 [ 1244.790229] protocol 88fb is buggy, dev hsr_slave_0 [ 1244.795711] protocol 88fb is buggy, dev hsr_slave_1 [ 1244.921433] IPVS: ftp: loaded support on port[0] = 21 [ 1245.030222] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.035877] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.786779] IPVS: ftp: loaded support on port[0] = 21 [ 1245.838707] chnl_net:caif_netlink_parms(): no params data found [ 1245.881470] bridge0: port 1(bridge_slave_0) entered blocking state [ 1245.888366] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.896440] device bridge_slave_0 entered promiscuous mode [ 1245.903863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1245.911151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.918193] device bridge_slave_1 entered promiscuous mode [ 1245.945738] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1245.960843] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1245.997674] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1246.005405] team0: Port device team_slave_0 added [ 1246.011345] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1246.018781] team0: Port device team_slave_1 added [ 1246.025313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1246.033815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1246.102716] device hsr_slave_0 entered promiscuous mode [ 1246.140483] device hsr_slave_1 entered promiscuous mode [ 1246.181861] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1246.193300] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1246.253912] chnl_net:caif_netlink_parms(): no params data found [ 1246.276602] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.283042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.289807] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.296424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.328876] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.335906] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.343047] device bridge_slave_0 entered promiscuous mode [ 1246.351965] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.358471] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.365694] device bridge_slave_1 entered promiscuous mode [ 1246.389050] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1246.399080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1246.422267] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1246.429383] team0: Port device team_slave_0 added [ 1246.435981] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1246.443485] team0: Port device team_slave_1 added [ 1246.449302] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1246.457922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1246.523382] device hsr_slave_0 entered promiscuous mode [ 1246.561136] device hsr_slave_1 entered promiscuous mode [ 1246.611533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1246.619262] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1246.646219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.653246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.660201] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.666969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.682730] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1246.688977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.700770] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1246.711841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1246.719205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.727689] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.735714] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.743019] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.759125] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1246.765425] 8021q: adding VLAN 0 to HW filter on device team0 [ 1246.777762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1246.786585] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.793285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.813127] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1246.821491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1246.830337] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.836877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.845740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1246.854501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1246.863843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1246.875525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1246.883020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1246.890776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1246.901475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1246.909694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1246.917723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1246.928809] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1246.935958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1246.960626] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.968333] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1246.977867] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1246.985572] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1246.992655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1247.002495] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1247.013511] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1247.020467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1247.027771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1247.039335] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1247.049477] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1247.058428] 8021q: adding VLAN 0 to HW filter on device team0 [ 1247.068898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1247.077130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1247.087792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1247.096067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.103047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1247.113566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1247.121348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1247.129290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1247.137436] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.144230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1247.155446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1247.163436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1247.177419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1247.185154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1247.204942] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1247.212412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1247.220886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.229809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1247.239696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1247.247227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1247.255368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.266901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1247.276653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1247.284546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1247.294981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1247.302825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1247.311275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1247.322333] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1247.328753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1247.359448] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1247.369359] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1247.376709] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1247.383988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1247.396091] 8021q: adding VLAN 0 to HW filter on device batadv0 23:26:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:09 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket$inet6(0xa, 0x2, 0x0) close(r4) r5 = socket$inet6(0xa, 0x2, 0x0) close(r5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000001300)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x200, @rand_addr="f067a101171e32acdbce2b52802d39fc", 0x2}, @in6={0xa, 0x4e20, 0x4dbc, @empty, 0x21}, @in6={0xa, 0x4e22, 0x2, @remote, 0xfffffffc}], 0x84) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmsg$can_raw(r6, &(0x7f00000012c0)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/53, 0x35}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2, &(0x7f00000011c0)=""/244, 0xf4}, 0x40000000) r7 = open(&(0x7f0000000100)='./bus\x00', 0x800000141042, 0x0) ftruncate(r7, 0x200006) sendfile(r5, r7, 0x0, 0x8000fffffffe) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r7, 0x4020565b, &(0x7f0000000000)={0x8001009, 0x1, 0x2}) r8 = open(&(0x7f0000000100)='./bus\x00', 0x800000141042, 0x0) ftruncate(r8, 0x200006) sendfile(r4, r8, 0x0, 0x8000fffffffe) fcntl$dupfd(r4, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000100)={0x0, 0xfe, 0x185, 0x0}) 23:26:09 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) 23:26:09 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:09 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) 23:26:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:09 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1248.747371] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1248.950179] net_ratelimit: 32 callbacks suppressed [ 1248.950186] protocol 88fb is buggy, dev hsr_slave_0 [ 1248.960845] protocol 88fb is buggy, dev hsr_slave_1 [ 1249.050880] device bridge_slave_1 left promiscuous mode [ 1249.056882] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.133294] device bridge_slave_0 left promiscuous mode [ 1249.140605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.190405] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.195731] protocol 88fb is buggy, dev hsr_slave_1 [ 1249.333110] device hsr_slave_1 left promiscuous mode [ 1249.373823] device hsr_slave_0 left promiscuous mode [ 1249.413879] team0 (unregistering): Port device team_slave_1 removed [ 1249.426763] team0 (unregistering): Port device team_slave_0 removed [ 1249.430205] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.438688] protocol 88fb is buggy, dev hsr_slave_1 [ 1249.447898] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1249.496776] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1249.560272] bond0 (unregistering): Released all slaves 23:26:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:26:10 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:10 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x7, 0x40100) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000140), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req={0x7fff, 0x40, 0xffffffff, 0x7fff}, 0x10) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000340)=0x3f) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x2, 0x3}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @multicast1}}}, &(0x7f0000000300)=0x84) socket(0x10, 0x400000000080803, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r5, 0x3ecb7b9d36d9df7d}, 0x14}}, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r6, 0x0, 0x0) getpriority(0x0, 0x0) 23:26:10 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) [ 1249.680278] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.685569] protocol 88fb is buggy, dev hsr_slave_1 23:26:10 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r1, 0x0, r0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) fdatasync(r4) dup2(r2, r3) r5 = socket$rxrpc(0x21, 0x2, 0xa) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x1ff) dup3(r6, r7, 0x0) bind$rxrpc(r5, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) r8 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r10, 0x401054d6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000100)) writev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000200)="dd93a21493ca5073732a83da66d951f57a782172ddfb128deb43dd11353ce5a1ec7e268afec94b856fdb4e5fff46f2d58cf1337c299553e4e4d4b4f094267fb6015252f2fb8bfc47171bb789a455b3bb21fa6fb851bff6e194b4437dc9e8a376c08531263c1969748cad3d4da2e9e7dced0cbeda50328c1e8b5218bb1fed632b", 0x80}], 0x1) writev(0xffffffffffffffff, &(0x7f0000001540)=[{0x0}], 0x1) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 23:26:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:26:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1249.840130] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.845789] protocol 88fb is buggy, dev hsr_slave_1 23:26:11 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r1, 0x0, r0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) fdatasync(r4) dup2(r2, r3) r5 = socket$rxrpc(0x21, 0x2, 0xa) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x1ff) dup3(r6, r7, 0x0) bind$rxrpc(r5, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) r8 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r10, 0x401054d6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000100)) writev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000200)="dd93a21493ca5073732a83da66d951f57a782172ddfb128deb43dd11353ce5a1ec7e268afec94b856fdb4e5fff46f2d58cf1337c299553e4e4d4b4f094267fb6015252f2fb8bfc47171bb789a455b3bb21fa6fb851bff6e194b4437dc9e8a376c08531263c1969748cad3d4da2e9e7dced0cbeda50328c1e8b5218bb1fed632b", 0x80}], 0x1) writev(0xffffffffffffffff, &(0x7f0000001540)=[{0x0}], 0x1) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 23:26:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x8, 0x2001) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x20000, 0x0) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f00000000c0)=ANY=[]) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10000004) fcntl$setstatus(r2, 0x4, 0x2800) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffffffd, 0x4c0000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f00000000c0)=0xfff, 0x4) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x800, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) 23:26:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f6105000a0081001f03fe0504000800080004000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000000)={0x7, 0x103, 0x0, {0x81, 0x7, 0x1, 0x9}}) [ 1250.097397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=18182 comm=syz-executor.5 [ 1250.177207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1252.151422] IPVS: ftp: loaded support on port[0] = 21 [ 1252.959900] chnl_net:caif_netlink_parms(): no params data found [ 1253.006334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.017868] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.025478] device bridge_slave_0 entered promiscuous mode [ 1253.033341] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.040411] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.048036] device bridge_slave_1 entered promiscuous mode [ 1253.076385] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1253.086199] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1253.105261] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1253.114369] team0: Port device team_slave_0 added [ 1253.123772] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1253.131486] team0: Port device team_slave_1 added [ 1253.137055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1253.145062] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1253.204383] device hsr_slave_0 entered promiscuous mode [ 1253.241135] device hsr_slave_1 entered promiscuous mode [ 1253.285380] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1253.293692] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1253.308389] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.314843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1253.321972] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.328467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1253.363590] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1253.370360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1253.378906] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1253.388581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1253.396181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.403747] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.421936] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1253.428459] 8021q: adding VLAN 0 to HW filter on device team0 [ 1253.438038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1253.445818] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.452571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1253.471531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1253.479174] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.486071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1253.504219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1253.512352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1253.525052] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1253.535779] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1253.547363] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1253.558914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1253.566716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1253.574884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1253.582629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1253.594981] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1253.605845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1253.612729] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1253.626932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1253.671977] device bridge_slave_1 left promiscuous mode [ 1253.677786] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.721498] device bridge_slave_0 left promiscuous mode [ 1253.727064] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.882632] device hsr_slave_1 left promiscuous mode [ 1253.959027] device hsr_slave_0 left promiscuous mode [ 1253.990164] net_ratelimit: 28 callbacks suppressed [ 1253.990172] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.001681] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.014032] team0 (unregistering): Port device team_slave_1 removed [ 1254.021264] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.021317] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.036342] team0 (unregistering): Port device team_slave_0 removed [ 1254.046704] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1254.086005] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1254.160304] bond0 (unregistering): Released all slaves [ 1254.215057] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:26:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:15 executing program 5: syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) add_key$user(0x0, &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(0x0, &(0x7f0000000300), &(0x7f0000000400)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x2, 0x4, [0xef1, 0xa4, 0x4, 0x5]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f00000002c0)={0x7f, 0x8103, 0x0, 0x4, r8}, 0x10) 23:26:15 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:15 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xfffffec6) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x3) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) process_vm_readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000004c0)=""/198, 0xc6}], 0x2, &(0x7f0000000200)=[{&(0x7f0000000bc0)=""/4096, 0x1000}], 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:26:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000000)=0x9, 0x4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text16={0x10, &(0x7f0000000040)="f021711f6726650f01c40f01c8660f3881260080d3110f20c06635000000800f22c0660f13a36300f30f090f350f01df", 0x30}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1254.884216] picdev_write: 4088 callbacks suppressed [ 1254.884236] kvm: pic: non byte write [ 1254.902442] kvm: pic: non byte write [ 1254.906614] kvm: pic: non byte write [ 1254.916072] kvm: pic: non byte write [ 1254.946139] kvm: pic: non byte write [ 1254.975900] kvm: pic: non byte write [ 1254.984850] kvm: pic: non byte write [ 1254.991264] kvm: pic: non byte write [ 1254.996120] kvm: pic: non byte write [ 1255.007310] kvm: pic: non byte write [ 1255.193388] protocol 88fb is buggy, dev hsr_slave_0 [ 1255.199738] protocol 88fb is buggy, dev hsr_slave_1 23:26:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r6 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000000c0)={'rose0\x00', 0xca1}) sendfile(r4, r5, 0x0, 0xa808) [ 1255.430150] protocol 88fb is buggy, dev hsr_slave_0 [ 1255.435370] protocol 88fb is buggy, dev hsr_slave_1 23:26:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, 0x0, 0xfffffffffffffe51, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @rand_addr="3e3d410067790f0ef76eca32cfa08e89"}, 0xd0) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20008007, &(0x7f0000319ff0)={0x2, 0x4e1e}, 0x10) sendto$inet(r1, &(0x7f0000000080)="dd", 0x1, 0x0, 0x0, 0x0) [ 1255.670179] protocol 88fb is buggy, dev hsr_slave_0 [ 1255.675289] protocol 88fb is buggy, dev hsr_slave_1 [ 1256.761410] IPVS: ftp: loaded support on port[0] = 21 [ 1257.629304] chnl_net:caif_netlink_parms(): no params data found [ 1257.675408] bridge0: port 1(bridge_slave_0) entered blocking state [ 1257.686148] bridge0: port 1(bridge_slave_0) entered disabled state [ 1257.694240] device bridge_slave_0 entered promiscuous mode [ 1257.701325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1257.707731] bridge0: port 2(bridge_slave_1) entered disabled state [ 1257.715175] device bridge_slave_1 entered promiscuous mode [ 1257.735094] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1257.748898] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1257.766629] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1257.773995] team0: Port device team_slave_0 added [ 1257.779596] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1257.786867] team0: Port device team_slave_1 added [ 1257.796507] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1257.804060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1257.874200] device hsr_slave_0 entered promiscuous mode [ 1257.920555] device hsr_slave_1 entered promiscuous mode [ 1257.964137] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1257.971614] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1257.986565] bridge0: port 2(bridge_slave_1) entered blocking state [ 1257.993111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1257.999821] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.006227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1258.042633] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1258.048854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1258.061272] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1258.069987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1258.078370] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.085523] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.099817] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1258.107081] 8021q: adding VLAN 0 to HW filter on device team0 [ 1258.117451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1258.125295] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.131806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1258.151887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1258.159631] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.166046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1258.173370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1258.182168] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1258.193472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1258.211583] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1258.222021] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1258.232471] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1258.239001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1258.246775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1258.258682] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1258.265865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1258.278357] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1258.287774] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1258.299459] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1258.340743] device bridge_slave_1 left promiscuous mode [ 1258.346227] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.372962] device bridge_slave_0 left promiscuous mode [ 1258.378525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.511699] device hsr_slave_1 left promiscuous mode [ 1258.624594] device hsr_slave_0 left promiscuous mode [ 1258.684911] team0 (unregistering): Port device team_slave_1 removed [ 1258.695293] team0 (unregistering): Port device team_slave_0 removed [ 1258.705836] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1258.746346] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1258.816629] bond0 (unregistering): Released all slaves [ 1258.855759] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:26:20 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd4f1b3ddf14c366d}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) symlink(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38f3c4"], 0x0, 0x3}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) pipe(&(0x7f0000000300)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 23:26:20 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=""/104}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{}, {}, {}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:26:20 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0)={0xcff, 0x0, 0x1, 0x1, 0x6, 0x3f, 0x20}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt(r1, 0x10e, 0xa, &(0x7f00000004c0)="9adc01ce", 0x4) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 23:26:20 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 1259.350393] net_ratelimit: 25 callbacks suppressed [ 1259.350399] protocol 88fb is buggy, dev hsr_slave_0 [ 1259.360515] protocol 88fb is buggy, dev hsr_slave_1 [ 1259.386019] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:26:20 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) 23:26:20 executing program 4: io_setup(0x2, &(0x7f0000000280)=0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 23:26:20 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) dup3(r0, r3, 0x0) 23:26:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) 23:26:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:26:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20c40, 0x0) [ 1259.590125] protocol 88fb is buggy, dev hsr_slave_0 [ 1259.595333] protocol 88fb is buggy, dev hsr_slave_1 23:26:20 executing program 2: [ 1259.830201] protocol 88fb is buggy, dev hsr_slave_0 [ 1259.835395] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.070572] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.075714] protocol 88fb is buggy, dev hsr_slave_1 23:26:21 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1260.230272] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.237997] protocol 88fb is buggy, dev hsr_slave_1 [ 1261.760515] device bridge_slave_1 left promiscuous mode [ 1261.766034] bridge0: port 2(bridge_slave_1) entered disabled state [ 1261.811269] device bridge_slave_0 left promiscuous mode [ 1261.816803] bridge0: port 1(bridge_slave_0) entered disabled state [ 1261.916673] device hsr_slave_1 left promiscuous mode [ 1261.954422] device hsr_slave_0 left promiscuous mode [ 1261.994642] team0 (unregistering): Port device team_slave_1 removed [ 1262.005834] team0 (unregistering): Port device team_slave_0 removed [ 1262.016807] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1262.055524] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1262.134038] bond0 (unregistering): Released all slaves [ 1263.891454] IPVS: ftp: loaded support on port[0] = 21 [ 1264.390144] net_ratelimit: 20 callbacks suppressed [ 1264.390150] protocol 88fb is buggy, dev hsr_slave_0 [ 1264.400218] protocol 88fb is buggy, dev hsr_slave_1 [ 1264.751776] IPVS: ftp: loaded support on port[0] = 21 [ 1264.773937] chnl_net:caif_netlink_parms(): no params data found [ 1264.834411] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.840983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.848013] device bridge_slave_0 entered promiscuous mode [ 1264.858769] bridge0: port 2(bridge_slave_1) entered blocking state [ 1264.865911] bridge0: port 2(bridge_slave_1) entered disabled state [ 1264.872983] device bridge_slave_1 entered promiscuous mode [ 1264.894101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1264.903554] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1264.927827] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1264.935331] team0: Port device team_slave_0 added [ 1264.941398] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1264.948525] team0: Port device team_slave_1 added [ 1264.957355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1264.967264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1265.092564] device hsr_slave_0 entered promiscuous mode [ 1265.140599] device hsr_slave_1 entered promiscuous mode [ 1265.213413] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1265.226331] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1265.233321] chnl_net:caif_netlink_parms(): no params data found [ 1265.267588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.274009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1265.280644] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.286988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1265.313833] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.320366] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.328163] device bridge_slave_0 entered promiscuous mode [ 1265.337554] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.344077] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.351751] device bridge_slave_1 entered promiscuous mode [ 1265.375159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1265.384940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1265.407773] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1265.415212] team0: Port device team_slave_0 added [ 1265.421249] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1265.428369] team0: Port device team_slave_1 added [ 1265.434238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1265.441915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1265.492567] device hsr_slave_0 entered promiscuous mode [ 1265.530400] device hsr_slave_1 entered promiscuous mode [ 1265.570976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1265.578661] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1265.590127] protocol 88fb is buggy, dev hsr_slave_0 [ 1265.595233] protocol 88fb is buggy, dev hsr_slave_1 [ 1265.607134] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.613562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1265.620217] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.626567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1265.646327] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1265.652539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1265.662316] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1265.680795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1265.690398] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.698522] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.707977] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.715275] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.725563] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1265.731888] 8021q: adding VLAN 0 to HW filter on device team0 [ 1265.741392] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1265.755618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1265.765129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1265.773931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1265.781655] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.788016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1265.796177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1265.806652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1265.813626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1265.821861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1265.829390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.835775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1265.842485] protocol 88fb is buggy, dev hsr_slave_0 [ 1265.847543] protocol 88fb is buggy, dev hsr_slave_1 [ 1265.856291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1265.865518] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1265.871785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1265.885261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1265.895182] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1265.903446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1265.913681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1265.921489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1265.932898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1265.939833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1265.947047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1265.955303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1265.963203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1265.971334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1265.979064] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1265.988810] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1265.995355] 8021q: adding VLAN 0 to HW filter on device team0 [ 1266.004018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1266.014623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1266.022580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1266.034354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1266.042053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1266.049532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1266.059681] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1266.066391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1266.074701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1266.080171] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.082225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1266.086711] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.095048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1266.107015] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.113468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1266.127918] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1266.135879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1266.146693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1266.154445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1266.162716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1266.170430] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.176954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1266.184000] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.189210] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.195155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1266.204228] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1266.213463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1266.221093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1266.227819] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1266.235304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1266.246576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1266.256989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1266.264309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1266.273193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1266.281242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1266.288887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1266.296670] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1266.306245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1266.322369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1266.330291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1266.339961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1266.352643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1266.367706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1266.375839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1266.386864] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1266.393754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1266.411284] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1266.419737] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1266.426349] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1266.433685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1266.447559] 8021q: adding VLAN 0 to HW filter on device batadv0 23:26:29 executing program 5: 23:26:29 executing program 2: 23:26:29 executing program 4: 23:26:29 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:29 executing program 3: 23:26:29 executing program 5: 23:26:29 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x236, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) 23:26:29 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) getpgid(0x0) 23:26:29 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) getpgid(0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 23:26:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 23:26:29 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000280)) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010202000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r4) [ 1268.716589] encrypted_key: keyword 'new' not allowed when called from .update method 23:26:29 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:29 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1268.886816] FAT-fs (loop3): Directory bread(block 513) failed [ 1268.907058] FAT-fs (loop3): Directory bread(block 514) failed [ 1268.921918] FAT-fs (loop3): Directory bread(block 515) failed [ 1268.928339] FAT-fs (loop3): Directory bread(block 516) failed [ 1268.941144] FAT-fs (loop3): Directory bread(block 517) failed [ 1268.947884] FAT-fs (loop3): Directory bread(block 518) failed [ 1268.963945] FAT-fs (loop3): Directory bread(block 519) failed [ 1268.983667] FAT-fs (loop3): Directory bread(block 520) failed [ 1268.990636] FAT-fs (loop3): Directory bread(block 521) failed [ 1268.997020] FAT-fs (loop3): Directory bread(block 522) failed 23:26:30 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000f40)=[{{&(0x7f0000000080)={0xa, 0x4e1e, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}], 0x19f, 0x8000) sendmmsg$inet(r0, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000006600)="99", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000001c0)="e7", 0x1}], 0x20a}}], 0x2, 0x604d044) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000040)=0x6, 0x2) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000000)=""/9) 23:26:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000400)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x0, 0x0}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000002c0)) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) [ 1269.750456] net_ratelimit: 32 callbacks suppressed [ 1269.750477] protocol 88fb is buggy, dev hsr_slave_0 [ 1269.761408] protocol 88fb is buggy, dev hsr_slave_1 [ 1269.985828] bridge0: port 2(bridge_slave_1) entered disabled state [ 1269.994354] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.000177] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.005878] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.230367] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.235550] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.412584] device bridge_slave_1 left promiscuous mode [ 1270.419953] bridge0: port 2(bridge_slave_1) entered disabled state 23:26:31 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x98428d57a99b5f44) io_setup(0xc, &(0x7f0000000100)=0x0) io_submit(r4, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fallocate(r0, 0x100000003, 0x40002, 0x28120001) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff80000000, 0x400200) setsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000040)=0x8000, 0x4) [ 1270.470167] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.475441] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.490977] device bridge_slave_0 left promiscuous mode [ 1270.496500] bridge0: port 1(bridge_slave_0) entered disabled state 23:26:31 executing program 4: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/chec\xddreqprot\x00', 0x143040, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)=ANY=[]) r1 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000180)={0x3, 0x0, 0x7743, 'queue1\x00', 0x10000}) r3 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20800, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r4, 0x4) r5 = dup2(0xffffffffffffffff, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$cgroup_int(r5, 0x0, 0x0) [ 1270.630107] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.630155] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.746719] device hsr_slave_1 left promiscuous mode [ 1270.794098] device hsr_slave_0 left promiscuous mode [ 1270.834588] team0 (unregistering): Port device team_slave_1 removed [ 1270.845494] team0 (unregistering): Port device team_slave_0 removed [ 1270.855708] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1270.905737] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1270.986927] bond0 (unregistering): Released all slaves 23:26:32 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000400)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x0, 0x0}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000002c0)) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) [ 1271.046404] device syz_tun left promiscuous mode [ 1271.052440] bridge1: port 1(syz_tun) entered disabled state 23:26:32 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x40000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) r2 = creat(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./bus\x00', 0x500000d) r4 = dup(0xffffffffffffffff) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x14) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, &(0x7f00000001c0)) socket$unix(0x1, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) prlimit64(r6, 0x0, 0x0, &(0x7f0000000600)) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000540)={0x4, 0x0, [{0x1c0000001, 0x4, 0x7fff, 0x7fff, 0x81}, {0x0, 0xfffffff9, 0xa3, 0x9, 0x6}, {0xc0000000, 0xdb, 0x4, 0x40, 0xf478}, {0x40000001, 0x3, 0x3ff, 0x1, 0x8}]}) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = geteuid() chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='.\x00', 0x33a7, 0x2, &(0x7f00000002c0)=[{&(0x7f00000000c0)="3c0e81597158dd9e59b8e5c59f729c89c445cbfffed536847d3141bd6d379c5a782d4143bdc5eb32d5353352b8a0a27796028955456b9b0ec84e854e26f4730d555c8df6cc3a30dcde6f8327a6f75698d3816d417a00ae65d5aa8831a15566cde8beac502d0e6cf78c9b3183cc68bfd82ba656a708db3abfadd641272f71e25435303f569d2d754e96a0f7d0410856e88d92eae36177467a42572eb8c9b1e2550c7ef695329943fd49026ad06fe2b8bdd338d6b8a7a11d3acc62a1a9505dd85dd33794470d9350b4129fdf8fd6a5", 0xce, 0x7}, {&(0x7f0000000280)="4b436343758f311e5ea3af75648aa51e603191269eae79825246faccbee1775caed385fef6", 0x25, 0x3}], 0x2000000, &(0x7f00000004c0)=ANY=[@ANYBLOB='nodots,dots,dots,euid<', @ANYRESDEC=r5, @ANYBLOB=',fsname=,defcontext=sysadm_u,dont_measure,uid<', @ANYRESDEC=r8, @ANYBLOB="0100"]) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @multicast2}, &(0x7f00000005c0)=0x10, 0x80800) 23:26:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x35, 0x0, &(0x7f0000000000)) r3 = dup3(r1, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r3, r3, 0x8, 0x3}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:26:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/f.le./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000380)='.//ile0\x00', 0x8, 0x1) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/f.le.\x00', 0x400, 0x24) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000009c0)={0x0, @reserved}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000240)={0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x2099, 0xfff}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f00000009c0)={0x0, @reserved}) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') symlink(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0/f.le./file0\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x5c200, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000400)) 23:26:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000400)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x0, 0x0}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000002c0)) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 23:26:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd02000000b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7374526970653d3078303030303030303030303030303030302c00b52410db7516"]) 23:26:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000400)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x0, 0x0}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000540)=""/174) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000002c0)) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) [ 1273.831440] IPVS: ftp: loaded support on port[0] = 21 [ 1274.703718] IPVS: ftp: loaded support on port[0] = 21 [ 1274.737007] chnl_net:caif_netlink_parms(): no params data found [ 1274.783809] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.790277] net_ratelimit: 18 callbacks suppressed [ 1274.790282] protocol 88fb is buggy, dev hsr_slave_0 [ 1274.790343] protocol 88fb is buggy, dev hsr_slave_1 [ 1274.805725] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.813251] device bridge_slave_0 entered promiscuous mode [ 1274.823080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.829428] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.836489] device bridge_slave_1 entered promiscuous mode [ 1274.866612] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1274.876508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1274.903364] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1274.912007] team0: Port device team_slave_0 added [ 1274.919853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1274.927117] team0: Port device team_slave_1 added [ 1274.935245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1274.943217] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1275.004282] device hsr_slave_0 entered promiscuous mode [ 1275.040940] device hsr_slave_1 entered promiscuous mode [ 1275.083184] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1275.090831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1275.119128] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.125590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.132255] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.138651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.217883] chnl_net:caif_netlink_parms(): no params data found [ 1275.268680] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.275422] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.282900] device bridge_slave_0 entered promiscuous mode [ 1275.298580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.305508] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.312939] device bridge_slave_1 entered promiscuous mode [ 1275.335175] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1275.346732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1275.372471] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1275.379609] team0: Port device team_slave_0 added [ 1275.385800] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1275.393769] team0: Port device team_slave_1 added [ 1275.402941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1275.410999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1275.474424] device hsr_slave_0 entered promiscuous mode [ 1275.520467] device hsr_slave_1 entered promiscuous mode [ 1275.564003] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1275.571554] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1275.596130] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.602566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.609187] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.615612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.630390] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1275.636645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1275.650616] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1275.663923] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1275.670099] 8021q: adding VLAN 0 to HW filter on device team0 [ 1275.676690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.684647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.692397] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.699745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.706774] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.714571] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1275.724104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1275.731397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1275.739223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1275.747565] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.753965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.766397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1275.779995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1275.787984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1275.796205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.802633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.813270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1275.828948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1275.840716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1275.848329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1275.858160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1275.870379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1275.878415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1275.886646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1275.897549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1275.911735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1275.919612] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1275.929096] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1275.935990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1275.944188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1275.951953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1275.958972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.968240] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1275.974660] 8021q: adding VLAN 0 to HW filter on device team0 [ 1275.986298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1275.993247] protocol 88fb is buggy, dev hsr_slave_0 [ 1275.993301] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.006634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1276.017829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1276.026116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1276.033978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1276.041702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1276.049500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1276.057165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.063568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1276.071230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1276.079100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1276.086809] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.093196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1276.102183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1276.117079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1276.124978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1276.133613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1276.142269] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1276.148365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1276.159763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1276.178077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1276.186250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1276.205217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1276.216864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1276.225444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1276.233744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1276.240173] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.241547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1276.245905] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.253653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1276.265597] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.265630] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.276764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1276.287797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1276.299971] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1276.306392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1276.314171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1276.325517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1276.335286] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1276.345821] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1276.352642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1276.361811] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1276.368332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1276.370205] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.379795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1276.380549] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.393347] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1276.400210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1276.415602] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1276.424250] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1276.439494] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1276.445994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1276.453668] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1276.471841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1276.631577] device bridge_slave_1 left promiscuous mode [ 1276.637134] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.671232] device bridge_slave_0 left promiscuous mode [ 1276.676889] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.712273] device bridge_slave_1 left promiscuous mode [ 1276.719099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.760936] device bridge_slave_0 left promiscuous mode [ 1276.767069] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.786115] EXT4-fs (loop4): Unrecognized mount option "stRipe=0x0000000000000000" or missing value [ 1276.985396] device hsr_slave_1 left promiscuous mode [ 1277.033652] device hsr_slave_0 left promiscuous mode [ 1277.076297] team0 (unregistering): Port device team_slave_1 removed [ 1277.086303] team0 (unregistering): Port device team_slave_0 removed [ 1277.098784] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1277.124580] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1277.206929] bond0 (unregistering): Released all slaves [ 1277.381926] device hsr_slave_1 left promiscuous mode [ 1277.443367] device hsr_slave_0 left promiscuous mode [ 1277.483613] team0 (unregistering): Port device team_slave_1 removed [ 1277.495691] team0 (unregistering): Port device team_slave_0 removed [ 1277.505501] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1277.545861] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1277.625333] bond0 (unregistering): Released all slaves 23:26:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:38 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0x5, &(0x7f0000000180)={0x10000000000ad, 0x800000d7}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000001c0)) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/dev_mcast\x00') sendfile(r3, r3, 0xfffffffffffffffe, 0x2000005) r4 = syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xcb7f931de45b7c23}, 0x0, 0x0, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x4, 0x1f, 0x0, 0x0, 0xecb7, 0x20191, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000001, 0x0, @perf_config_ext, 0x80, 0x2, 0x1, 0x4, 0xfffffffffffffffc, 0x0, 0xfffe}, 0x0, 0x2000000009, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket(0x11, 0x80002, 0xcf) socket(0x5, 0x4, 0x42) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r5) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f00000006c0)={0x2, 0x4e23, @multicast1}, 0xa1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x80540, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:26:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') sendfile(r0, r0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) syz_open_dev$sndctrl(0x0, 0xfffffffffffffffb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="778741f35c6700000000918f8745d5c11fe0a8a4ec52e633dc11b51bce84705d99f76cf4", @ANYBLOB="e54e00002000000000000800000018"], 0x2}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = creat(0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', 0x0, 0xfea5, 0x0) r3 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x40d09) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000340)) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$selinux_create(r5, &(0x7f0000000080)=@objname={'system_u:object_r:memory_device_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x6, 0x20, './bus\x00'}, 0x4f) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) accept(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000500)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 23:26:38 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd02000000b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7374526970653d3078303030303030303030303030303030302c00b52410db7516"]) 23:26:38 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1277.782891] EXT4-fs (loop4): Unrecognized mount option "stRipe=0x0000000000000000" or missing value 23:26:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) getpeername$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:39 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="e2f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x21, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "c5b4b41f18c7099a", "8900bda10b87475eca74c76b1ce76237", "9afb8252", "fa95818d868492c9"}, 0x28) r1 = socket$inet6(0xa, 0x3, 0x88) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r5}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r5, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000780)={0x7, 0x200, 0x2, 0x9, r5}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) shutdown(r6, 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f00000001c0)={@mcast1, 0x7a, r8}) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xfffffffffffffdf5) r12 = socket(0x10, 0x2, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x9, 0x80, 0x40, 0x80, 0x0, 0x7, 0x40400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0xa, @perf_bp={&(0x7f0000000600), 0x4}, 0x2040, 0xf000000000000000, 0x0, 0x9, 0x8, 0x2, 0xe18}, r13, 0xb, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000580)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r14, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x2, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="6d3bf24e6dedc48a4a232fcc6ae5e5eb34dd5610b2302aa641274e2a050d60ec0d8d7fc43302524e0f8731adfeb1fdd4351ad0993ec5cf34fac18d6141564b220948f1219772400b04b06d3896d11f7f4b37deeedb09c16d1ce005c61a896ddb29d5e2e97c425bf09f47b4c5a3fadd655562b569a4991eb96a7af9fedace9a9305f7df476ca865ef7cf897cc60", 0x8d, 0x1}, {&(0x7f0000000800)="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", 0x1000, 0x4}], 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB='minixdf,delalloc,grpjquota=,jqfmt=vfsv1,noblock_validity,obj_type=GPL[eth0}#,fowner>', @ANYRESDEC=r10, @ANYBLOB=',eqid=', @ANYRESDEC=r11, @ANYBLOB=',dont_measure,context=system_u,euid<', @ANYRESDEC=r14, @ANYBLOB=',\x00']) 23:26:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x81000000, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000000c0), 0x91) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f00000000c0)=ANY=[]) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000940)) unlink(&(0x7f0000000040)='./file0\x00') 23:26:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) getpeername$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1278.116281] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1278.146400] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1278.173377] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1278.358787] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1278.461759] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 23:26:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_PRIORITY={0x8}]}}}]}, 0x3c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x1}, 0x1, 0xfdffffff00000000, 0x0, 0x4040000}, 0x2c00c074) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 1278.510106] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1278.557903] EXT4-fs error (device loop4): ext4_iget:4712: inode #2: comm syz-executor.4: root inode unallocated [ 1278.593166] EXT4-fs (loop4): get root inode failed [ 1278.628190] EXT4-fs (loop4): mount failed [ 1280.150194] net_ratelimit: 30 callbacks suppressed [ 1280.150199] protocol 88fb is buggy, dev hsr_slave_0 [ 1280.160222] protocol 88fb is buggy, dev hsr_slave_1 [ 1280.390183] protocol 88fb is buggy, dev hsr_slave_0 [ 1280.395325] protocol 88fb is buggy, dev hsr_slave_1 [ 1280.630185] protocol 88fb is buggy, dev hsr_slave_0 [ 1280.635303] protocol 88fb is buggy, dev hsr_slave_1 [ 1280.710122] protocol 88fb is buggy, dev hsr_slave_0 [ 1280.715252] protocol 88fb is buggy, dev hsr_slave_1 [ 1280.950153] protocol 88fb is buggy, dev hsr_slave_0 [ 1280.955282] protocol 88fb is buggy, dev hsr_slave_1 [ 1281.321384] IPVS: ftp: loaded support on port[0] = 21 [ 1282.077313] IPVS: ftp: loaded support on port[0] = 21 [ 1282.154874] chnl_net:caif_netlink_parms(): no params data found [ 1282.214374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.220888] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.227939] device bridge_slave_0 entered promiscuous mode [ 1282.235589] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.242085] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.249111] device bridge_slave_1 entered promiscuous mode [ 1282.283337] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1282.329324] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1282.378743] chnl_net:caif_netlink_parms(): no params data found [ 1282.396266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1282.403909] team0: Port device team_slave_0 added [ 1282.414909] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1282.422073] team0: Port device team_slave_1 added [ 1282.431608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1282.439394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1282.502629] device hsr_slave_0 entered promiscuous mode [ 1282.540411] device hsr_slave_1 entered promiscuous mode [ 1282.586036] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1282.603558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.610121] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.617150] device bridge_slave_0 entered promiscuous mode [ 1282.624016] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1282.638028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.644726] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.655604] device bridge_slave_1 entered promiscuous mode [ 1282.679270] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1282.692941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.699420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1282.706074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.712480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1282.721551] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1282.745763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1282.753349] team0: Port device team_slave_0 added [ 1282.767195] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1282.774934] team0: Port device team_slave_1 added [ 1282.781802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1282.789873] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1282.853364] device hsr_slave_0 entered promiscuous mode [ 1282.890387] device hsr_slave_1 entered promiscuous mode [ 1282.961411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1282.973965] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1282.997361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.004100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1283.010733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.017735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1283.052957] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1283.059047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1283.070964] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1283.089262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1283.096835] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.104474] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.112345] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.119017] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.131059] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1283.137264] 8021q: adding VLAN 0 to HW filter on device team0 [ 1283.146306] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1283.162227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1283.169885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1283.179292] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1283.186086] device bridge_slave_1 left promiscuous mode [ 1283.192320] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.231362] device bridge_slave_0 left promiscuous mode [ 1283.236867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.362034] device hsr_slave_1 left promiscuous mode [ 1283.403027] device hsr_slave_0 left promiscuous mode [ 1283.454521] team0 (unregistering): Port device team_slave_1 removed [ 1283.464788] team0 (unregistering): Port device team_slave_0 removed [ 1283.474598] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1283.533491] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1283.603742] bond0 (unregistering): Released all slaves [ 1283.653824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1283.662249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1283.669836] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.676319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1283.685821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1283.695025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1283.705069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1283.712746] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.719152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1283.728541] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1283.737254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1283.745161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1283.753556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1283.760623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1283.770910] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1283.776980] 8021q: adding VLAN 0 to HW filter on device team0 [ 1283.787307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1283.794814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1283.805769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1283.814115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1283.823053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1283.832577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1283.841294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1283.848307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1283.856370] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1283.864375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.870899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1283.881318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1283.890730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1283.897979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1283.905876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1283.917055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.923586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1283.931429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1283.939540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1283.949345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1283.957570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1283.968326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1284.021236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1284.028396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1284.036370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1284.044448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1284.054976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1284.065863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1284.073767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1284.084280] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1284.091447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1284.099363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1284.110097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1284.117955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1284.126699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1284.139119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1284.149907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1284.158580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1284.168218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1284.180812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1284.189551] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1284.199790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1284.217792] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1284.238993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1284.247754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1284.262969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1284.276025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1284.287428] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1284.304079] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1284.319267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1284.328265] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1284.343822] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1284.355561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1284.365716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1284.377242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1284.386626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1284.403522] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1284.414872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1285.190489] net_ratelimit: 38 callbacks suppressed [ 1285.190495] protocol 88fb is buggy, dev hsr_slave_0 [ 1285.200579] protocol 88fb is buggy, dev hsr_slave_1 [ 1285.664394] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.674005] bridge0: port 1(bridge_slave_0) entered disabled state 23:26:47 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, 0x0, 0x200500, 0x0) renameat2(r2, &(0x7f00000000c0)='./bus\x00', 0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x5) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800000022002907ff000014f81100fe8000000000000000000000000000aa84c65c51af42ec431bf1bacd0a08862e00a2b5420b2a05f6bfff95a1d1035f2e4f965bb08463440f567df9cc4049d5b79978144e3f5793576ac1b357029f4f020869aa1f0c747d2d0ebcd7d33566be0d3f261ace100483a29238b7fc7b7d2bca1e2ddcd5cb181a9558004813018aed"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000100)=0x7) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$TCSETA(r5, 0x5406, 0x0) bind$bt_rfcomm(r5, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x0, 0x3}}, 0xa) getsockopt$bt_BT_VOICE(r5, 0x112, 0xb, 0x0, &(0x7f0000000240)) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_proto_private(r6, 0x89e2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) 23:26:47 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:47 executing program 2: unshare(0x20020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = inotify_init1(0x0) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) fadvise64(r5, 0x10000, 0x40, 0x3) r6 = dup2(0xffffffffffffffff, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000100)={0x0, 0x2, 0x1}) inotify_add_watch(r3, &(0x7f0000000800)='./file0\x00', 0xa400295c) poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f00000000c0)='./file0\x00') 23:26:47 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="e2f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x21, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x88) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "c5b4b41f18c7099a", "8900bda10b87475eca74c76b1ce76237", "9afb8252", "fa95818d868492c9"}, 0x28) r1 = socket$inet6(0xa, 0x3, 0x88) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r5}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r5, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000780)={0x7, 0x200, 0x2, 0x9, r5}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) shutdown(r6, 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f00000001c0)={@mcast1, 0x7a, r8}) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xfffffffffffffdf5) r12 = socket(0x10, 0x2, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x9, 0x80, 0x40, 0x80, 0x0, 0x7, 0x40400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0xa, @perf_bp={&(0x7f0000000600), 0x4}, 0x2040, 0xf000000000000000, 0x0, 0x9, 0x8, 0x2, 0xe18}, r13, 0xb, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000580)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r14, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x2, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="6d3bf24e6dedc48a4a232fcc6ae5e5eb34dd5610b2302aa641274e2a050d60ec0d8d7fc43302524e0f8731adfeb1fdd4351ad0993ec5cf34fac18d6141564b220948f1219772400b04b06d3896d11f7f4b37deeedb09c16d1ce005c61a896ddb29d5e2e97c425bf09f47b4c5a3fadd655562b569a4991eb96a7af9fedace9a9305f7df476ca865ef7cf897cc60", 0x8d, 0x1}, {&(0x7f0000000800)="f7db9e2c5a4f718d179428507e2e64b02f174f575bbe529d1894d1ad92583aa37e318e05361839b3d055137a16fadb328e6e7a93af75ab6cf0a43d431cd3638a8b4cf3acc56413203e1e5a31d86aa9d7d0c1dfb2a4d9db7dd0b39ce0e1b9f72df6fb8dbc16d74b89aacde548953627cc1a9cbbf6cfc53b88e424e19c9b7ef3cab0743a79b29f06c0a68043e55aecfdbbe421d06a1da6536815b1b8bd63a4c8719244f2a5f20966db63e1e79ccda0037f08ac7fdfb7efe7999b80bb1eac77c9636c10da456235ba8b6fb8870fc7d4f38994b9d5cf320744eeab24ac870647b179271528663b3537b0290f821b717528052f3aea0fbabf9aa96bd5fb511f2c8c94bb0e7302136fda783ff1c9c2c3efd7efcfc2819fdba7b418013afcdc886b0c2d23c59f7e16c96e9578323098d197740d486a169009a3217ef58a1ef44657a2656d495688373bbfb573d9eee275c0db38bd63ec0ae7eec541fe5211b517168ca795f729a07d0f89b2faf8880156fd2b29a33df3d75a3029132104c2598b14469e1341900ddc58e8d7cec6e18a0532d4acea1189d54800be3f497b3ccb60952d1182fd419a71bf67668e7c79132ce23279906ec09f1f471c13bcb325c21ded9642bcf2bedcfe9ee5342608bbad6c19648dedb6340a11cc1aa077a496de1f7a051e30d5e023f93814a4dab9b12b4b3a4a04c8369c5a1339e734855e2953b5b03bf7392afb7770fc16e5cc751ded72b69fcc9fbfbfe03baa40f9f78a28a8b19ef9995ceba28765f63021f42b0fdec605ae671ec20c5443bac44cfacd95e601753193c7b2e40f8ee372bc11fa81fe3cb2000854ea41ee5497a9c474184504eb9853d3145c8f475a587cddd626a28fe37bc7bbbee44e855fd0ada246cca51b5a91a1a95a324329f094e3f968347ed9536646d40c8ed4408387c4d97b0c0afe5d69bd60f8debe4f395c21fc5da3ac1435096dfdd362b0e6744c3c381a2a5d5bcc230f29741d2ad6776ad0c7e1a2fcbbf945b9b0de78e88ea13a26ca5807a4562b60e41502272fe7aa188cc121bb89f1ca1d36e93f003ffeca4da12a56927715cf13acdc48badc8f637a154a156dfbf7f3b82f43a4b80ab3675795b1658793ca643b1a0bdd7a042115f535b0b27f99f07ca5278d5232bbd48fa9e4dc46a0b21626787fd57d4728478a7a6bed5b7de9065b297b61cdb1c19ece298cde910c4ca02bc847bb16c8ec555d2e10e8b53edb08f4c387229596fb6bee0e717d17d2032bfbefa9eb805e63654fcd6525d4776476b3ce9ee91371c24dcd1212d9848728c430f6ccb41d63160b7b423c38b36aef80be39a27ac3e5e9a63eff9d1f4e6e58c42bc1b002f5fc032df6fdff3731a32cb459f74db26768f58507a07df2cba3fb87cf3fe3ccf16f86c4e68a11f4913992aa89ff0cce268bfd78e76857d53c5d86e986f72eb9e6819bb1bd32b32fa7cfa6a3f8028d3c4b095afbd6808dd1fe3b2f19e489fbeb35629508514d8cbbba213400e4c9c907c2118516ed3095ac54495db96b81c358633356b40da34dbf96f8cbfd50707c470c19a23c8171aef14b85d09eb69621b58bc929329be40f5953aff9be57ca95e77bd5a927ff9e280773dee68ca6ee5ce40d371d61621f3065a827b1c931aa57c8ae8db2a61f131a60f36a5d65ece561659bf78051303fce23d40586657730fe209f5f516ba32406b151f86fdb18110cb6d7522c43ffbadc7345f1fe3c40f27d6fe7438262fea49f4503d6be8745faa0a7e4ab92e61aeb9ae626497d4fee1613f05bc6b0094cab638c019b38ef13465f05ade4da37d50865b479e971bbf3f3f5011b96670ffdfa6ace59042b72c6072b025a76dfd166a7476f73faf6285e9e3ada641ef136427717e4c35e785f60c8decb2ff2f8302e79f1b667dd3a27d6a16a0258a3322002aecea4520d0e9b11fc4cc502e8a805b696bcc45e477cc356e6dac56e957c908a309674e0e6795dfa71d6736280f6be1d344edb860ccf6231ce7caf17c80cac0a46fb76065b3ed742b080d40fd7d43c218a0075dddc70b98f67462f165d964f7abd1d603020a6b22ebeec15e88bb4ae9ab30dbcef2c00649ea033a24cd2bd1b527038f446491dfa2ceadefecd4aa8d13064ca74bd684d7255e4e3b419a6f85ff82cc41e6e4f0eae45bacb315372d12c4b89e416f6f01cf629b5c022eb968a19367327b422d2ad9c7ca3f6eafe1ec45e0dfd319b7186b9846a14b9926a50fbe671e39913136f82c668416b2b4aeae3d7c0546ca91e5509015f6d9604572c6ae098864f2e14edc7c11f055a5184f354f052b5dd7574f8b1069d9f3998cf5de47f864468bb008e60614c51d21028039ecdde16eb509614e65d27c3799884e897e4efb2e0a224e4c63ae4f526dfe36d7d19505806926fd2588e47bff88ceeb11356aed07b4cfaae7b2750b01cd2f8408f31348916710f2adefd7dc4a668eb91b3b34cc2bb809bd6b9a752fa8441da6a331f3a83d6e01cf7124ea483b28c8b80f0c7e44ac4bdde1ace3a57b7497fac9af7289fc7509823f5b485df44db6a91a4dd7551523a350f65cb3508366c977518da89d313e76da6210eee8ffa13dd2e8081c202ad423572300dfe7e0abb9e3dfc3615d10bcabf5c90bf71dd7b32c6f1faf32f8324e06d4456451d47bf7344e9326340e8fe3ac91785a8bab5150675e8ec0352eabd8437799f6a770dc8a1930eae2e4a27cdb3dcb6f7b7beff872c362e1939e145f6fbafaf0e744725058fa88a7d18c65ee16947805f0b9ddb4ff87f83158e7fc71efd589f7d6d6a8b9485fb7597b7caec6b94da947771d10e2a768a6875d11962cafef7578988d86f533708e9e250d0e89b9d428d6a39eb76cea99c09e6163e6636f9dd3c5acf55ff2458c26360bd1152e5c0a29a4fd35da19ee760dc42e972e6bc2780b8caa7e344cb5ac3f6455377295e0f2a6110c969d53cd8b86a32332cfa0b082db6c31b3ad86df8e027d652b126cc21ff9dc0a263e362bfd545355c2f429629380f6b3e052ba8ad8538c3273fb9673ad75d614d6ed308e15eda744b9ab310b35d9bc522255eab000594ad4a104f1c58f5bd3224d48cc75b0ce40995a02ec0e0c64c38bd1f006ab2762012f1fa35b29f1a04b810d3b5bc09e6d5f55db14cae0f7d3547212ba236a17c73d805e035a593715050830b09c42c54585a173d0e55269569f4d9be23e03b9e8d0743af304e1b940b3ee6af9ce9ecbcf080c64083c83dc22654a51de09dae8c09870067976cc869af94e91614f8b1467476b66be1ce32ba501577230ebd70e0a16c741efbfd2e37aa97c824a8ea344555a9f9a03ae4dfaa001bb81c635a7db2229e526dafd1ec2424c912c0be8afa8360189e37fceb8a001a6bfafa1b2de16b6f3d5efbf7922f4d2ec4f11d4906133f2a16387891f39d4a3d289655a43fa05776b5fe1eae9a7e597fa9b3b21f71892e85166f4dbd9251cb25ca31a3df476599081a1f67abf8803d570ba99a9b3230a4701442741e161fe4714ad657922800f318393546af87772703de02d640a9ab8969762af09db9dc0d10bbc890d4ab583a0287a43e0bc232dc8c21b3d8454f1669b8c7e888a52bfdcaa380860cb42c92763a08462521ec10be2232f1816cd81d31a29706c88594c468e61dff74ab99f327dd2b40a3d676a9c632c1e7854e8448d9557286d6e9faf486c033703878e0f21d27a67ae23bd7276c1539062fea0df6879939ddb9a4a9ae287ef41f11e4164c5de41e29f11cbc8d2550eec99b98028ebead58af44b71e13e817d5a735e9a3ca09847d8d62d7a01efe5a07926b917df70b8aaae2f82ab6c7351c9ae48b1f1852b004d8c8961adf92ef8bc82e15059e1caacf644a61fed5318fa99510d54349b869679853fbdc59ee7d45beb9a9607487db6764d3e95662e513ec2604618240ae4036b3867a0cf6af9a403490545730b73c449827d3ffec897e144941b443f8c6377ca9c11e3a44450283b3543bc9be12676c98b992d3306a4605435d94b70d549009a8783c6d190515b969280939d8ed4c81f4694ff9fc0b12bb0b800b658923d5e09821b624048effc4a7e20d21649de39eeee6fdaa789a4ec1ba57e6cc999aff0e99a075256c125ebd680a3409965cc0d49a890bbf4f77de3ac712d85908e32f2a2177ab41e655be7fdffa50201ee91fb37e1dc846b64b1f191223f6c60f2f1aaadc1891ca17daecfe2f5aa215199bb3c8a30fc481a4e0ac5b85c24942e60a8be72d5f41f42d225f539ab35adc5688e27fa010e5ef79a32ba6db145ee901cbfe9065838183d5bc64bda0d824d30b6e3457a601440c5dc1d46472d86f9cbdc9c0576400d3cc7f2ae089bee4dce6749c364bbe1ddf345a28b64c5a0be664c9b12ba1a2de691a4b586e2408199e3d6397be06349816f54a2616d082f9fdb49112f0d4263375122bd997346ee4c55b7cf3db9dc821c7e221cf32804bb39739b3dbd7ebe41307eabb36bc80b23bc4bee9ca3d9715622509ead5f87bbcdcb6cdfdbd3aec153e60826815a9a0224c605da1e238a1b0f760a5366c16f1f0177330133b11c52d6058a06e23605820410e04bc96c8538796bc3b793f59e01e403fb8627780d1f2942c800fc9309b24215a4cd0a4b7e49772176007153a35fbd09dfea6600d600d02e8860d78fd333846a6dbe00c55a8725ead374b0ad8ffa12bf83c25bc730c1f3d1b249e4c4d9c9387dd0eb9679825a2c6ffa8fd0fd3759a9428269fdd04cf9fb9fa3822d76d7506036b5beca51990758b35ccff5e4495286a9cdeeba3ce728daea50ca4e4664b60d7512d6bce5789fcf932619ba9eee1752328be21b36f845ee65c0b282353e5d4877c554c1b486fa577e73855013cffde46f2d2137ad4e50f51d03e0f008e62a4c6158ebb4a3e2f5664375d8d7bd1b5202db2ea8077c2d1c2671c65343631bdd3fd39d7cdf6d9ffab2a0bd13abce41bb0060ea79ebca562f3fcbb284ed7fdc1eb524ad615234b1b5bfe537bf7ed04f7adfd7a632fffcfd95c42b4feb5c5951a2f4bf0bbe7c6138c7dd5499fd12c9210562f0cb50bfbb632c10429c4123709085a444112d8d885171be3bfbf044ba8d25fdcc9c418454fc684e3ba2ccb5d636e29f4707fae815da5df84a874dc4e7e498964ec6c27ea367f13f60f0a88641be56e4c3da84d20fb7573d2ba03ce7949d923d0740ef62c25bc8acfc5b18c7b33acc6520a9c5a58ff2da23d1bb634df70adf0bbeb460777bcea4d0e913390c32645197c845669d180087e25471a6526d0105ca17aa6a1ac1e6562cb76623625b0409ae6892ede5c148bf28a4a3d3566b67c706a36edb3a4e2be13b315c708f63d975774c5f872db53bbc41906a6fe4753ba9da1204893500f6059bb80bc91a18d27440e5a1c4568a07fd1bce7ea6accb68532a37c04f7f88c40ecd676b7c23285b2526533c94cd34e3ec87d40a2046c18274899fda48958aa78ab4864ce8934e7ccf4b9299969d02ae6399c44c24206925f3ec6f316dfbce16ba8c80bb5ecda81b790303fcd797d93a9dec12e5a146163bd1066886264c12c1ab28ef659501c16dc6001df2d768f51c8838978c3c15ff1cd40ee78a97a5f279fe79d763e8ea25476b15c16d8ec2108317683da9191d5594eafb55b70fa38430eb72332ecfecc7131e8adcfe675f9361b5e942d110c24072563c2a4aae24de172714e957261884b8a03edc08208fb148735fbeb6ac945f61bde4946d87247c1630d945816a68ca9f780b32fdb93d27f66c591190e386257ae55f6f9db940739", 0x1000, 0x4}], 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB='minixdf,delalloc,grpjquota=,jqfmt=vfsv1,noblock_validity,obj_type=GPL[eth0}#,fowner>', @ANYRESDEC=r10, @ANYBLOB=',eqid=', @ANYRESDEC=r11, @ANYBLOB=',dont_measure,context=system_u,euid<', @ANYRESDEC=r14, @ANYBLOB=',\x00']) 23:26:47 executing program 3: r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0x76, 0x4) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/de6/s\x05\x00eenamr\x00', 0x200000, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KDDELIO(r5, 0x4b35, 0x8) r6 = syz_open_dev$adsp(&(0x7f00000007c0)='/dev/adsp#\x00', 0x1, 0x141000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000800), &(0x7f0000000840)=0x4) connect$nfc_llcp(r2, &(0x7f0000000280)={0x27, 0x8004, 0x0, 0x0, 0x0, 0x0, "b3f8077229ff82588a8e8a7b668599e779e4024399e57ddd1832e5b8b4f4b699cdab75d0e55ef4a02bd22954c5ecbc6b24f09702618a7e3a8f9abcd61a0ac0", 0x18}, 0x60) 23:26:47 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/100, 0x64}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xe8}, 0x1, 0x68, 0x0, 0x1}, 0x0) 23:26:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000200)=0xb7, 0x4) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) keyctl$setperm(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000000c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @dev}, &(0x7f0000000180)=0xc) recvfrom$packet(r2, &(0x7f0000000240)=""/146, 0x92, 0x0, &(0x7f0000000340)={0x11, 0xdebe8d78f4ef0cdc, r4, 0x1, 0x43}, 0x14) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x41) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r6, 0x80006) sendfile(r5, r6, 0x0, 0x8000fffffffe) 23:26:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) getpeername$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1286.384076] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1286.393364] protocol 88fb is buggy, dev hsr_slave_0 [ 1286.393410] protocol 88fb is buggy, dev hsr_slave_1 [ 1286.406890] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.5'. 23:26:47 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) getpeername$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1286.452455] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1286.481795] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 23:26:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1286.566184] EXT4-fs error (device loop4): ext4_iget:4712: inode #2: comm syz-executor.4: root inode unallocated [ 1286.588152] EXT4-fs (loop4): get root inode failed [ 1286.609829] EXT4-fs (loop4): mount failed [ 1286.630128] protocol 88fb is buggy, dev hsr_slave_0 [ 1286.635277] protocol 88fb is buggy, dev hsr_slave_1 [ 1286.720142] protocol 88fb is buggy, dev hsr_slave_0 [ 1286.725351] protocol 88fb is buggy, dev hsr_slave_1 [ 1286.870292] protocol 88fb is buggy, dev hsr_slave_0 [ 1286.875431] protocol 88fb is buggy, dev hsr_slave_1 23:26:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) getpeername$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:48 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:48 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xffffffff, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x81000000, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x91) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1, @local}, &(0x7f00000002c0)=0xc) sendmsg$can_bcm(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x1d, r4}, 0x10, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="03000000c00000000500000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_misc(r6, &(0x7f0000000680)={'syz1', "aa62e1de86f4ba15884a3e02a6334a3c8c811c9197e10034809b747b86a1d7fa0b2fac61df6de13b6c544bd4c6830a69659904d355c8b44f457596e771ad3dd5b261739bfdf98035e565e79534baa858204edbadd9a8958329edb302fdf4584072e51e68c39cba1b7ba3771ae72b68cd3585d5cf53f4726341a4fa1e475747cd3e82054914811fc093f3808e00f8996da03ed5781ebae906484bb3305694d05db6"}, 0xa5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r8, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4000000, &(0x7f00000001c0)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r8, &(0x7f0000005fc0), 0xa9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000540)) unlink(&(0x7f0000000040)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) [ 1287.274200] device bridge_slave_1 left promiscuous mode [ 1287.341195] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.408689] device bridge_slave_0 left promiscuous mode [ 1287.447287] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.616681] device hsr_slave_1 left promiscuous mode [ 1287.699852] device hsr_slave_0 left promiscuous mode [ 1287.788331] team0 (unregistering): Port device team_slave_1 removed [ 1287.856197] team0 (unregistering): Port device team_slave_0 removed [ 1287.941407] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1287.976208] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1288.096321] bond0 (unregistering): Released all slaves [ 1288.179250] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1288.192825] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1288.207521] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:26:49 executing program 5: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@creator={'creator', 0x3d, "8d2c3b41"}}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000140)={0x0, @multicast2, 0x4e22, 0x0, 'none\x00', 0x4, 0x21, 0x55}, 0x2c) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bind(r0, &(0x7f00000000c0)=@un=@file={0x1, './file0\x00'}, 0x80) 23:26:49 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xffffffff, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x81000000, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x91) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1, @local}, &(0x7f00000002c0)=0xc) sendmsg$can_bcm(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x1d, r4}, 0x10, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="03000000c00000000500000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_misc(r6, &(0x7f0000000680)={'syz1', "aa62e1de86f4ba15884a3e02a6334a3c8c811c9197e10034809b747b86a1d7fa0b2fac61df6de13b6c544bd4c6830a69659904d355c8b44f457596e771ad3dd5b261739bfdf98035e565e79534baa858204edbadd9a8958329edb302fdf4584072e51e68c39cba1b7ba3771ae72b68cd3585d5cf53f4726341a4fa1e475747cd3e82054914811fc093f3808e00f8996da03ed5781ebae906484bb3305694d05db6"}, 0xa5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r8, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4000000, &(0x7f00000001c0)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r8, &(0x7f0000005fc0), 0xa9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000540)) unlink(&(0x7f0000000040)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) 23:26:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:26:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xffffffff, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x81000000, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x91) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1, @local}, &(0x7f00000002c0)=0xc) sendmsg$can_bcm(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x1d, r4}, 0x10, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="03000000c00000000500000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_misc(r6, &(0x7f0000000680)={'syz1', "aa62e1de86f4ba15884a3e02a6334a3c8c811c9197e10034809b747b86a1d7fa0b2fac61df6de13b6c544bd4c6830a69659904d355c8b44f457596e771ad3dd5b261739bfdf98035e565e79534baa858204edbadd9a8958329edb302fdf4584072e51e68c39cba1b7ba3771ae72b68cd3585d5cf53f4726341a4fa1e475747cd3e82054914811fc093f3808e00f8996da03ed5781ebae906484bb3305694d05db6"}, 0xa5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r8, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4000000, &(0x7f00000001c0)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r8, &(0x7f0000005fc0), 0xa9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000540)) unlink(&(0x7f0000000040)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) [ 1288.437186] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1288.449701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1288.464613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1290.441431] IPVS: ftp: loaded support on port[0] = 21 [ 1290.550171] net_ratelimit: 16 callbacks suppressed [ 1290.550177] protocol 88fb is buggy, dev hsr_slave_0 [ 1290.560254] protocol 88fb is buggy, dev hsr_slave_1 [ 1290.790192] protocol 88fb is buggy, dev hsr_slave_0 [ 1290.795351] protocol 88fb is buggy, dev hsr_slave_1 [ 1290.870146] protocol 88fb is buggy, dev hsr_slave_0 [ 1290.875345] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.030152] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.035251] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.350437] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.352131] IPVS: ftp: loaded support on port[0] = 21 [ 1291.355555] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.391979] chnl_net:caif_netlink_parms(): no params data found [ 1291.459710] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.466585] bridge0: port 1(bridge_slave_0) entered disabled state [ 1291.473540] device bridge_slave_0 entered promiscuous mode [ 1291.485797] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.492311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1291.499279] device bridge_slave_1 entered promiscuous mode [ 1291.526420] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1291.535986] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1291.601712] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1291.608940] team0: Port device team_slave_0 added [ 1291.637695] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1291.646713] team0: Port device team_slave_1 added [ 1291.657499] chnl_net:caif_netlink_parms(): no params data found [ 1291.667531] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1291.676109] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1291.753031] device hsr_slave_0 entered promiscuous mode [ 1291.790530] device hsr_slave_1 entered promiscuous mode [ 1291.846197] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1291.861887] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1291.889405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.896522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1291.905519] device bridge_slave_0 entered promiscuous mode [ 1291.913006] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.919362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1291.926533] device bridge_slave_1 entered promiscuous mode [ 1291.953844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.960280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1291.966901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.973285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1291.985752] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1292.004416] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1292.027721] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1292.036674] team0: Port device team_slave_0 added [ 1292.049309] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1292.057189] team0: Port device team_slave_1 added [ 1292.066513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1292.075191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1292.154095] device hsr_slave_0 entered promiscuous mode [ 1292.190473] device hsr_slave_1 entered promiscuous mode [ 1292.247533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1292.255581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1292.275501] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1292.282423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1292.295119] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1292.304220] bridge0: port 2(bridge_slave_1) entered blocking state [ 1292.310739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1292.317320] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.323719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1292.337350] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1292.343746] 8021q: adding VLAN 0 to HW filter on device team0 [ 1292.351116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1292.358205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.365111] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.372193] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1292.379647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.387087] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.400342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1292.411478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1292.418892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1292.427354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1292.435561] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.441967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1292.448904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1292.457346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1292.465039] bridge0: port 2(bridge_slave_1) entered blocking state [ 1292.471429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1292.492962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1292.509746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1292.520619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1292.528876] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1292.546234] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1292.554691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1292.562134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1292.570708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1292.577665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1292.591099] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1292.597378] 8021q: adding VLAN 0 to HW filter on device team0 [ 1292.607290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1292.615218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1292.623192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1292.631282] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.637642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1292.646654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1292.655553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1292.665997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1292.674294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1292.681970] bridge0: port 2(bridge_slave_1) entered blocking state [ 1292.688308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1292.695435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1292.704033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1292.714576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1292.726647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1292.733895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1292.744056] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1292.755737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1292.764038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1292.773912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1292.783587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1292.790772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1292.798376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1292.806029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1292.821077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1292.830778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1292.841149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1292.848193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1292.860727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1292.868262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1292.876923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1292.884903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1292.893449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1292.902758] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1292.908842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1292.918271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1292.928647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1292.937698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1292.945656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1292.963271] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1292.972582] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1292.980646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1292.988280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1292.996905] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1293.005512] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1293.012832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1293.020144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1293.026988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1293.039557] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1293.066931] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1293.075963] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1293.082652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1293.089678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1293.110991] 8021q: adding VLAN 0 to HW filter on device batadv0 23:26:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="43b3b81679010362c4230d726dcfa65d94a678f23714a361d36b3497617530016e3c21311fc6281edc048644458cc53d370bcae860b8114045ba24104cf04a5dfeffdda703b58eca2d0484e943cc9b47cf9e925a3f9974e22c001163e9305244f8af718bd5284bacbe99977fe30da27e5a35574596a2c2904b06e8fbee85d2683ff43bbeae7a19c62f684fc10ea9da7c182d1751ab544608a44408427c1dd0ae2cb29a83441d69f2d48aa2f82c5f51de31b307afc031bf47359e5133acb932a3320190d1140267063e8f", 0xca}], 0x2010, &(0x7f0000000240)={[{@whint_mode_user='whint_mode=user-based'}, {@acl='acl'}, {@extent_cache='extent_cache'}], [{@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@audit='audit'}, {@fsname={'fsname'}}, {@dont_measure='dont_measure'}]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x60000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="778741f35c00000000918f874555c11fe0a8a4ec52e633dc11b51bce84705d99f7708e7bc8f81d9b1411040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3cd8372c229e4f268cf85e3ed17c5bde8842888700", @ANYRES16=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x18500400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000340)={0x27c, r4, 0xb12, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffce}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf943}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4bca}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x829}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xc1f7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xba}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_NODE={0x50, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4000}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd9b0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3931}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xae}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b22, &(0x7f0000000000)='wlan0\x00') socket$rds(0x15, 0x5, 0x0) 23:26:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xffffffff, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x81000000, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x91) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1, @local}, &(0x7f00000002c0)=0xc) sendmsg$can_bcm(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x1d, r4}, 0x10, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="03000000c00000000500000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_misc(r6, &(0x7f0000000680)={'syz1', "aa62e1de86f4ba15884a3e02a6334a3c8c811c9197e10034809b747b86a1d7fa0b2fac61df6de13b6c544bd4c6830a69659904d355c8b44f457596e771ad3dd5b261739bfdf98035e565e79534baa858204edbadd9a8958329edb302fdf4584072e51e68c39cba1b7ba3771ae72b68cd3585d5cf53f4726341a4fa1e475747cd3e82054914811fc093f3808e00f8996da03ed5781ebae906484bb3305694d05db6"}, 0xa5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r8, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4000000, &(0x7f00000001c0)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r8, &(0x7f0000005fc0), 0xa9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000540)) unlink(&(0x7f0000000040)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) 23:26:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xffffffff, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa0, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x81000000, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa0}}, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x91) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1, @local}, &(0x7f00000002c0)=0xc) sendmsg$can_bcm(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x1d, r4}, 0x10, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="03000000c00000000500000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_misc(r6, &(0x7f0000000680)={'syz1', "aa62e1de86f4ba15884a3e02a6334a3c8c811c9197e10034809b747b86a1d7fa0b2fac61df6de13b6c544bd4c6830a69659904d355c8b44f457596e771ad3dd5b261739bfdf98035e565e79534baa858204edbadd9a8958329edb302fdf4584072e51e68c39cba1b7ba3771ae72b68cd3585d5cf53f4726341a4fa1e475747cd3e82054914811fc093f3808e00f8996da03ed5781ebae906484bb3305694d05db6"}, 0xa5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r8, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4000000, &(0x7f00000001c0)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r8, &(0x7f0000005fc0), 0xa9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000540)) unlink(&(0x7f0000000040)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) 23:26:55 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1294.171414] device bridge_slave_1 left promiscuous mode [ 1294.177421] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.231171] device bridge_slave_0 left promiscuous mode [ 1294.242380] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.301830] device bridge_slave_1 left promiscuous mode [ 1294.308921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.371112] device bridge_slave_0 left promiscuous mode [ 1294.378238] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.444398] device bridge_slave_1 left promiscuous mode [ 1294.464821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.544042] device bridge_slave_0 left promiscuous mode [ 1294.557384] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.633263] device bridge_slave_1 left promiscuous mode [ 1294.644973] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.733378] device bridge_slave_0 left promiscuous mode [ 1294.744744] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.262423] device hsr_slave_1 left promiscuous mode [ 1295.303700] device hsr_slave_0 left promiscuous mode [ 1295.343881] team0 (unregistering): Port device team_slave_1 removed [ 1295.381421] team0 (unregistering): Port device team_slave_0 removed [ 1295.412630] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1295.464159] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1295.590188] net_ratelimit: 40 callbacks suppressed [ 1295.590193] protocol 88fb is buggy, dev hsr_slave_0 [ 1295.600691] protocol 88fb is buggy, dev hsr_slave_1 [ 1295.612970] bond0 (unregistering): Released all slaves [ 1295.732800] device hsr_slave_1 left promiscuous mode [ 1295.774295] device hsr_slave_0 left promiscuous mode [ 1295.834089] team0 (unregistering): Port device team_slave_1 removed [ 1295.862283] team0 (unregistering): Port device team_slave_0 removed [ 1295.886135] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1295.933780] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1295.995599] bond0 (unregistering): Released all slaves [ 1296.063523] device hsr_slave_1 left promiscuous mode [ 1296.103607] device hsr_slave_0 left promiscuous mode [ 1296.143911] team0 (unregistering): Port device team_slave_1 removed [ 1296.155717] team0 (unregistering): Port device team_slave_0 removed [ 1296.165504] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1296.224157] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1296.317928] bond0 (unregistering): Released all slaves [ 1296.392629] device hsr_slave_1 left promiscuous mode [ 1296.456498] device hsr_slave_0 left promiscuous mode [ 1296.514401] team0 (unregistering): Port device team_slave_1 removed [ 1296.524489] team0 (unregistering): Port device team_slave_0 removed [ 1296.534970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1296.583815] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1296.664989] bond0 (unregistering): Released all slaves [ 1296.742065] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1296.749935] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1296.757294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:26:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x170}}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpeername$ax25(r4, &(0x7f0000000140)={{0x3, @default}, [@rose, @remote, @null, @bcast, @null, @netrom, @default]}, &(0x7f0000000080)=0x48) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) r10 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r11 = dup2(0xffffffffffffffff, r10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r11, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r12 = accept4$tipc(r11, &(0x7f0000000800)=@id, &(0x7f0000000840)=0x10, 0xc0000) fsetxattr$security_smack_entry(r12, &(0x7f0000000880)='security.SMACK64IPOUT\x00', &(0x7f00000008c0)='/dev/kvm\x00', 0x9, 0x2) write(r9, &(0x7f0000000340), 0x41395527) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r9, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, &(0x7f0000000380)={0x1, 0x5}, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0xe, 0x80000000, 0x3}, &(0x7f0000000400)=0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0xb409}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r8, r5, 0x0, 0x1, &(0x7f00000001c0)='\x00', r13}, 0x30) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:26:57 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa36a9b04e4288904b5b9ff3cd30dea927c1c2411e0539b6b4e0a77855d24ffd17b1e90f19c891d9197512364feb1a36ebf7ad665d8557c39d74e59577ab9de203e83b6b6aeea809a7452ee345dc9589e43f45e161e400df08ee1167c6ee733a13b0bfbcd16cce53ae717beface43d4da434bad2cec3dea9f1c49b73faffdd3c40c179984ba85aabd12eabd0bab1b12a225f82bb907872998c85e519c2125a1fd8bb12dc4ba50914ffe1de76fb25c94189e3fbc480e64e7ce1478861325ff06a93"], 0x1}, 0x1, 0xfdffffff00000000}, 0x20008084) ioctl(r3, 0x7, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000040)={0xc, 0x0, 0xfa00, {&(0x7f0000000200)}}, 0x10) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x4c3) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 23:26:57 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1296.867537] netlink: 120 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.893333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1296.909542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1296.929563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1296.949472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1296.973071] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1296.998498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1297.017785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1297.030123] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.030176] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.040732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 [ 1297.053499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 23:26:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1297.067101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18708 comm=syz-executor.2 23:26:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:26:58 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1297.270113] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.275361] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.510517] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.515953] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.590279] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.595669] protocol 88fb is buggy, dev hsr_slave_1 [ 1301.390945] IPVS: ftp: loaded support on port[0] = 21 [ 1302.171816] IPVS: ftp: loaded support on port[0] = 21 [ 1302.199818] chnl_net:caif_netlink_parms(): no params data found [ 1302.248176] IPVS: ftp: loaded support on port[0] = 21 [ 1302.269939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.276512] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.284668] device bridge_slave_0 entered promiscuous mode [ 1302.293591] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.299941] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.306901] device bridge_slave_1 entered promiscuous mode [ 1302.338556] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1302.349011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1302.389073] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1302.396381] team0: Port device team_slave_0 added [ 1302.438535] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1302.446290] team0: Port device team_slave_1 added [ 1302.454242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1302.467461] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1302.475613] chnl_net:caif_netlink_parms(): no params data found [ 1302.554759] device hsr_slave_0 entered promiscuous mode [ 1302.602865] device hsr_slave_1 entered promiscuous mode [ 1302.664796] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1302.678778] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.686413] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.694238] device bridge_slave_0 entered promiscuous mode [ 1302.701305] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1302.707989] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.714593] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.723155] device bridge_slave_1 entered promiscuous mode [ 1302.802197] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1302.814051] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1302.821943] chnl_net:caif_netlink_parms(): no params data found [ 1302.853562] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.859945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.866558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.872936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.901266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1302.908426] team0: Port device team_slave_0 added [ 1302.914691] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1302.922172] team0: Port device team_slave_1 added [ 1302.927849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1302.953389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1302.967055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.973880] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.980896] device bridge_slave_0 entered promiscuous mode [ 1302.988122] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.994705] bridge0: port 2(bridge_slave_1) entered disabled state [ 1303.001788] device bridge_slave_1 entered promiscuous mode [ 1303.074165] device hsr_slave_0 entered promiscuous mode [ 1303.140425] device hsr_slave_1 entered promiscuous mode [ 1303.201238] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1303.218803] bridge0: port 1(bridge_slave_0) entered disabled state [ 1303.226584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1303.244375] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1303.257706] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1303.279886] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1303.305054] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1303.313455] team0: Port device team_slave_0 added [ 1303.319566] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1303.326882] team0: Port device team_slave_1 added [ 1303.333186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1303.341446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1303.412519] device hsr_slave_0 entered promiscuous mode [ 1303.450549] device hsr_slave_1 entered promiscuous mode [ 1303.517681] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1303.524776] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1303.533115] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1303.561596] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1303.574711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1303.584231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1303.594551] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1303.608131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1303.615458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1303.625315] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1303.631766] 8021q: adding VLAN 0 to HW filter on device team0 [ 1303.642096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1303.653044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1303.663572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1303.671540] bridge0: port 1(bridge_slave_0) entered blocking state [ 1303.678101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1303.688185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1303.697478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1303.706347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1303.713958] bridge0: port 2(bridge_slave_1) entered blocking state [ 1303.720346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1303.736771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1303.746359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1303.757139] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1303.765644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1303.777014] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1303.788913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1303.797828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1303.805179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1303.812526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1303.823313] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1303.829400] 8021q: adding VLAN 0 to HW filter on device team0 [ 1303.846446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1303.855175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1303.865569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1303.873968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1303.882774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1303.893557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1303.901510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1303.909058] bridge0: port 1(bridge_slave_0) entered blocking state [ 1303.915444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1303.923009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1303.931370] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1303.938883] bridge0: port 2(bridge_slave_1) entered blocking state [ 1303.945275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1303.952597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1303.959557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1303.969269] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1303.982309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1303.995062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1304.004533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1304.014896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1304.022790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1304.031104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1304.038574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1304.058935] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1304.065389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1304.074360] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1304.084471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1304.093560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1304.103362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1304.111003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1304.123252] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1304.133875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1304.142929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1304.153548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1304.162381] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1304.168414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1304.178183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1304.188253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1304.198543] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1304.205786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1304.213920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1304.221799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1304.229219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1304.237411] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1304.246892] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1304.261136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1304.268426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1304.278616] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1304.285575] 8021q: adding VLAN 0 to HW filter on device team0 [ 1304.293295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1304.304338] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1304.311467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1304.319027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1304.328045] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1304.336174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1304.344095] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1304.350907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1304.357555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1304.365537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1304.373483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.379816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1304.388183] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1304.394722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1304.405559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1304.412993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1304.424037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1304.432420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1304.439965] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.446341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1304.457691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1304.465100] device bridge_slave_1 left promiscuous mode [ 1304.476733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.530800] device bridge_slave_0 left promiscuous mode [ 1304.536267] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.591751] device bridge_slave_1 left promiscuous mode [ 1304.597842] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.631126] device bridge_slave_0 left promiscuous mode [ 1304.636609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.795489] device hsr_slave_1 left promiscuous mode [ 1304.843024] device hsr_slave_0 left promiscuous mode [ 1304.883271] team0 (unregistering): Port device team_slave_1 removed [ 1304.895137] team0 (unregistering): Port device team_slave_0 removed [ 1304.904941] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1304.954226] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1305.032684] bond0 (unregistering): Released all slaves [ 1305.132018] device hsr_slave_1 left promiscuous mode [ 1305.192993] device hsr_slave_0 left promiscuous mode [ 1305.253033] team0 (unregistering): Port device team_slave_1 removed [ 1305.263756] team0 (unregistering): Port device team_slave_0 removed [ 1305.274099] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1305.313776] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1305.385328] bond0 (unregistering): Released all slaves [ 1305.455808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1305.471157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1305.490918] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1305.506510] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1305.515103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1305.522313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1305.529051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1305.542687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1305.555919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1305.566359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1305.575048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1305.583802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1305.591863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1305.600357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1305.608482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1305.617297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1305.632660] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1305.641074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1305.651030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1305.662715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1305.677785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1305.689169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1305.701816] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1305.708005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1305.722707] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1305.731303] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1305.737821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1305.745797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1305.757265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1305.901987] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1305.909421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1305.924444] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:27:07 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0) r0 = socket$inet(0x2, 0x4, 0xec) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x13) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa02f59bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 23:27:08 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) socket$inet(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048000704ab092500090007000a010000000000000000e293210001c000000000000000000000000000039815fa2c1ec28656aaa79bb94b46fe000000bc0002", 0x43) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r6 = dup2(0xffffffffffffffff, r5) set_mempolicy(0x2, &(0x7f0000000100)=0x9, 0x7fffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) bind$llc(r1, &(0x7f00000000c0)={0x1a, 0x338, 0xc1, 0x0, 0x3, 0x5, @dev={[], 0xc}}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 23:27:08 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0204010008100400000000003255490000000000001b00000000000000060000b851e265230000000000000000"], 0x2d}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x921380, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000140)={0x0, 0x10000000, 0xc23a, 'queue1\x00', 0x2336}) ioctl$KVM_NMI(r1, 0xae9a) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r3, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xb8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0xfffffffffffffffe, 0x1000000000000]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:27:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:08 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:08 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f00000000c0)=ANY=[]) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000100)='systemem0\x00', 0xa) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f00000000c0)=0xffffffff, 0x4) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xc000000}}], 0x4000000000000d0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept$alg(r4, 0x0, 0x0) dup(0xffffffffffffffff) [ 1306.968976] audit: type=1800 audit(1574033228.085:302): pid=18800 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 23:27:08 executing program 5: syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x200, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, 0x10, r0, 0xa9322000) r1 = syz_open_dev$dspn(0x0, 0x200000044ad, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x7}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000300)={r5, @in6={{0xa, 0x4e23, 0x101, @local, 0x3}}, 0x1, 0x8, 0x5538, 0x4, 0x26}, 0x98) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) fcntl$setstatus(r6, 0x4, 0x2800) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 1307.083456] selinux_nlmsg_perm: 6 callbacks suppressed [ 1307.083468] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.166698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 23:27:08 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r7, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1307.219965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.288533] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 23:27:08 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1307.340278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.375467] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.430374] net_ratelimit: 2 callbacks suppressed [ 1307.430378] protocol 88fb is buggy, dev hsr_slave_0 [ 1307.440392] protocol 88fb is buggy, dev hsr_slave_1 [ 1307.443611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.475190] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.501066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 [ 1307.536405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18807 comm=syz-executor.3 23:27:08 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r7, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:08 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1307.670142] protocol 88fb is buggy, dev hsr_slave_0 [ 1307.675279] protocol 88fb is buggy, dev hsr_slave_1 [ 1307.910333] protocol 88fb is buggy, dev hsr_slave_0 [ 1307.915571] protocol 88fb is buggy, dev hsr_slave_1 [ 1309.780954] IPVS: ftp: loaded support on port[0] = 21 [ 1310.574104] chnl_net:caif_netlink_parms(): no params data found [ 1310.617578] bridge0: port 1(bridge_slave_0) entered blocking state [ 1310.625200] bridge0: port 1(bridge_slave_0) entered disabled state [ 1310.632499] device bridge_slave_0 entered promiscuous mode [ 1310.639384] bridge0: port 2(bridge_slave_1) entered blocking state [ 1310.645929] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.653274] device bridge_slave_1 entered promiscuous mode [ 1310.676280] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1310.686245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1310.706746] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1310.715658] team0: Port device team_slave_0 added [ 1310.725486] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1310.733315] team0: Port device team_slave_1 added [ 1310.738779] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1310.746376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1310.793297] device hsr_slave_0 entered promiscuous mode [ 1310.831397] device hsr_slave_1 entered promiscuous mode [ 1310.883675] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1310.894037] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1310.907586] bridge0: port 2(bridge_slave_1) entered blocking state [ 1310.914073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1310.920761] bridge0: port 1(bridge_slave_0) entered blocking state [ 1310.927147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1310.962799] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1310.968904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1310.977596] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1310.989519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1310.997356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1311.004183] bridge0: port 2(bridge_slave_1) entered disabled state [ 1311.019044] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1311.025374] 8021q: adding VLAN 0 to HW filter on device team0 [ 1311.035273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1311.043686] bridge0: port 1(bridge_slave_0) entered blocking state [ 1311.050079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1311.070547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1311.078302] bridge0: port 2(bridge_slave_1) entered blocking state [ 1311.084747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1311.092745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1311.101727] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1311.111846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1311.128637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1311.139746] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1311.151418] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1311.157530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1311.165154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1311.181380] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1311.190407] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1311.197171] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1311.206835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1311.260839] device bridge_slave_1 left promiscuous mode [ 1311.266339] bridge0: port 2(bridge_slave_1) entered disabled state [ 1311.291326] device bridge_slave_0 left promiscuous mode [ 1311.297281] bridge0: port 1(bridge_slave_0) entered disabled state 23:27:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000140)=""/230, 0xe6}], 0x2, &(0x7f0000000280)=""/78, 0x4e}, 0x2000) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000380)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @loopback}, 0x12, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000340)='bridge0\x00', 0x4, 0x8000, 0xc8}) fchdir(r0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:27:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff21) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x25d) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) syz_open_procfs(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0xff53) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(&(0x7f0000000400)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 23:27:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff9000006000000141b1100fe8000000000000000000000000000aa1f4f30d5801a00a3497e9fa9a73c504bd663cf1b055b357a7a49d15b23a204dc64a35e24df6317570820ee71abb124aadabd0296fb64de79cb638a2ffcbab67281c7923cd70ac692e62b7f8917b6e0fd0fd81bd41c1081c66868ff199b928f3498d7e8d6317e96f11fe23dcc96ea2067d7a0b1bdfeede2fd85b5a296d7622ca4af785b88c29e31f41e0ff0f05acc5559f452ea52d0016e0e91695d8c25ce1f83f39fcac71888e77676de487108c51fb90a0f3174e14fc1ebbcd8be00bf4e73faebb19e46a055d4e32dda74fd59323579620829812d736edd031353bf6a2ff8e90439ed8d29fddaba5cd63859ebd838066b931bd1e5d9c6440f0f1ceb05c666a306ab00fc2217498eeb7e6642fb123f983915b3591a9b1b73c393fdd240a62efe7dc5ce21fb7396db9547485a1c350c92cfb598b717a3312fcf1f30234a3cbe639dba9f42637b25f4d7bea1fcf3752cbe143f8ef2f681ef0f9289b0871e9419c62a8ced1238a7cb5cb8cac905e83ca9b7f8b4b7253545409319ae747aa481db75d37196ec84533830cb2dd81a421359d89d902fe769cc198a2ae70254b7220218272de6591e1ce7cac12a7d151458d671addb8ee23d65ae9dbb3a6ad688e4554e3cc8"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mlockall(0x3) 23:27:12 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r7, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:12 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffd, 0x20000}, 0x0) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1424, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280066ffdc010014001100fe80000000000000002000"/40], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x40000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa0341237efdca47ad70fa34e3091dc0f0a710de0caba1e012053c93172f707106505796ea2dff09b5914440259050495c9f9dc9a1f95c12deb815c59a1590e7960a287c1bb588876b4aac41"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r8 = dup2(r7, r5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$PPPIOCSMRU1(r8, 0x40047452, &(0x7f0000000200)=0x3) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f00000000c0)=ANY=[]) getsockname$packet(r9, &(0x7f00000000c0), &(0x7f00000001c0)=0x14) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) getsockopt$rose(r11, 0x104, 0x5, &(0x7f0000000340), &(0x7f0000000400)=0x4) write(r10, &(0x7f0000000340), 0x41395527) sendto$inet(r10, 0x0, 0x0, 0x4004080, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) shmctl$SHM_LOCK(0x0, 0xb) [ 1311.439007] device hsr_slave_1 left promiscuous mode [ 1311.496210] device hsr_slave_0 left promiscuous mode [ 1311.511209] protocol 88fb is buggy, dev hsr_slave_0 [ 1311.516755] protocol 88fb is buggy, dev hsr_slave_1 [ 1311.554646] team0 (unregistering): Port device team_slave_1 removed [ 1311.590153] protocol 88fb is buggy, dev hsr_slave_0 [ 1311.595341] protocol 88fb is buggy, dev hsr_slave_1 [ 1311.622144] team0 (unregistering): Port device team_slave_0 removed [ 1311.639885] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1311.714020] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1311.787581] bond0 (unregistering): Released all slaves [ 1311.838319] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1313.845948] IPVS: ftp: loaded support on port[0] = 21 [ 1314.808719] chnl_net:caif_netlink_parms(): no params data found [ 1314.899224] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.920164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.927465] device bridge_slave_0 entered promiscuous mode [ 1314.965205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.972433] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.979717] device bridge_slave_1 entered promiscuous mode [ 1315.015400] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1315.029493] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1315.087836] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1315.105558] team0: Port device team_slave_0 added [ 1315.145091] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1315.152550] team0: Port device team_slave_1 added [ 1315.165390] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1315.185998] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1315.263551] device hsr_slave_0 entered promiscuous mode [ 1315.320435] device hsr_slave_1 entered promiscuous mode [ 1315.360866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1315.368236] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1315.384080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1315.391366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1315.397948] bridge0: port 1(bridge_slave_0) entered blocking state [ 1315.404338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1315.436195] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1315.443579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1315.452788] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1315.462416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1315.469621] bridge0: port 1(bridge_slave_0) entered disabled state [ 1315.476434] bridge0: port 2(bridge_slave_1) entered disabled state [ 1315.485709] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1315.492197] 8021q: adding VLAN 0 to HW filter on device team0 [ 1315.501282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1315.509817] bridge0: port 1(bridge_slave_0) entered blocking state [ 1315.516226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1315.530636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1315.538227] bridge0: port 2(bridge_slave_1) entered blocking state [ 1315.544620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1315.555518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1315.563463] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1315.573032] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1315.589194] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1315.599579] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1315.609806] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1315.616784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1315.624574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1315.632549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1315.645380] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1315.653577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1315.660803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1315.672048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1315.770747] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:27:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:18 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000006080)='/dev/null\x00', 0x101080, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000060c0)={0xffffff61, @random="8bdf719ce851"}) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x18, 0x6, 0x0, @dev, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xf19}]}}}}}}}}, 0x0) 23:27:18 executing program 3: syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x78, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000, 0x0, 0x0, 0x60], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @rand_addr="bb467fbc264c2d96b2c55265e0114569", [@dstopts={0x19, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0x19}, @ra, @jumbo]}, @routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}]}}}}}}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) r2 = socket(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) io_setup(0x4aa, &(0x7f0000000280)) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r5}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r5, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r5, 0x3f}, &(0x7f0000000040)=0x8) 23:27:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = socket(0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3f, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='btrfs\x00', 0x280000, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') r2 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=0x0, &(0x7f0000000280)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000380)={0x40, 0x8205, 0x0, 0x5, r3}, 0x10) 23:27:18 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(0xffffffffffffffff, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:18 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001040)='/dev/snapshot\x00', 0x1, 0x0) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f00000001c0)=0xfbfbcce1237b0cdb, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x8, 0x0, 0x10000, 0x7}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000002c0)={0x8, r5}) [ 1317.544651] net_ratelimit: 4 callbacks suppressed [ 1317.544656] IPv6: addrconf: prefix option has invalid lifetime [ 1317.560727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:27:18 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38f3c40047a040c42bc55a891b0f"], 0x0, 0xe}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) pipe(&(0x7f0000000300)={0xffffffffffffffff}) dup3(0xffffffffffffffff, r3, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000580)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x2) bind$unix(0xffffffffffffffff, &(0x7f00000019c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000001c0)=0xf436, 0x4) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1317.588570] syz-executor.4 (18901) used greatest stack depth: 22496 bytes left 23:27:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000003900), 0x242, 0x40000102, 0x0) [ 1317.830148] protocol 88fb is buggy, dev hsr_slave_0 [ 1317.830181] protocol 88fb is buggy, dev hsr_slave_1 [ 1317.835257] protocol 88fb is buggy, dev hsr_slave_1 [ 1317.954918] overlayfs: filesystem on './file0' not supported as upperdir 23:27:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1318.002938] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 23:27:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4020aeb2, &(0x7f0000000080)) 23:27:19 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x204000, 0x0) fcntl$getflags(r0, 0xb) [ 1318.075314] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 23:27:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(0xffffffffffffffff, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) 23:27:19 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20161146, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1ff, 0x200) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) r1 = socket$inet(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000700000000040073b891b39e40e35b9055388a93ce957f6ed500f914223b91e66841fbebb6ca7ede7fc0b5793a0eff8d14727b69a48cc04594e0131d1b8f2e"], 0x1}}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hwrng\x00', 0x4480, 0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8914104}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)={0xfffffea0, r3, 0x5, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYRES64=r5, @ANYBLOB="20002dbd700000000000000087a6acf800fe1325367dd8d0c86e23871452563bc2399ad8ce5c6a87005e5d11f54ac9ce8cc3a26ca0b300c6bb3db9f864ccd2be348eaf4033c6220461e799eadd85a564dcf3a5f1ca"], 0x2}, 0x1, 0x0, 0x0, 0xd450cdf532322ae6}, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x4008) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000380)='[\x00', 0x2) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000004c0)={0x9, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e22, @loopback}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x3, 0x2, 0x3, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0xa}, 0x8, 0x8001, 0x0, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x3b9d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x3a080, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) 23:27:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) 23:27:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) [ 1318.339573] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.345213] protocol 88fb is buggy, dev hsr_slave_1 23:27:19 executing program 5: seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) 23:27:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) getdents64(r2, 0x0, 0x600) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x28100) socket$inet_udp(0x2, 0x2, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x600) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) [ 1318.431463] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 23:27:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x2800) dup3(r0, r1, 0x0) 23:27:19 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x29001) writev(r0, &(0x7f0000002540)=[{&(0x7f0000000200)='X', 0x1}], 0x1) [ 1318.492819] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.526287] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.587295] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.624261] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.649233] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.659299] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.678020] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1318.760729] device bridge_slave_1 left promiscuous mode [ 1318.766289] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.830957] device bridge_slave_0 left promiscuous mode [ 1318.846685] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.003778] device hsr_slave_1 left promiscuous mode [ 1319.050165] device hsr_slave_0 left promiscuous mode [ 1319.084335] team0 (unregistering): Port device team_slave_1 removed [ 1319.118963] team0 (unregistering): Port device team_slave_0 removed [ 1319.149530] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1319.198105] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1319.294367] bond0 (unregistering): Released all slaves [ 1320.991406] IPVS: ftp: loaded support on port[0] = 21 [ 1321.849246] chnl_net:caif_netlink_parms(): no params data found [ 1321.893151] bridge0: port 1(bridge_slave_0) entered blocking state [ 1321.899609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.912171] device bridge_slave_0 entered promiscuous mode [ 1321.919681] bridge0: port 2(bridge_slave_1) entered blocking state [ 1321.926385] bridge0: port 2(bridge_slave_1) entered disabled state [ 1321.933804] device bridge_slave_1 entered promiscuous mode [ 1321.952889] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1321.962556] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1321.987253] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1321.995189] team0: Port device team_slave_0 added [ 1322.001288] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1322.008392] team0: Port device team_slave_1 added [ 1322.014069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1322.021821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1322.093113] device hsr_slave_0 entered promiscuous mode [ 1322.140510] device hsr_slave_1 entered promiscuous mode [ 1322.184955] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1322.192508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1322.208291] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.215311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.221957] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.228449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.263240] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1322.269348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1322.277995] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1322.286844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1322.294715] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.301561] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.315417] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1322.321784] 8021q: adding VLAN 0 to HW filter on device team0 [ 1322.331050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1322.338608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.345080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.354501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1322.362367] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.368701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.389151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1322.397042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1322.411933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1322.419525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1322.433128] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1322.443627] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1322.449699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1322.456967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1322.475845] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1322.483381] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1322.491026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1322.502007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1322.650507] device bridge_slave_1 left promiscuous mode [ 1322.656018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.701216] device bridge_slave_0 left promiscuous mode [ 1322.708374] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.803267] device hsr_slave_1 left promiscuous mode [ 1322.906529] device hsr_slave_0 left promiscuous mode [ 1322.964418] team0 (unregistering): Port device team_slave_1 removed [ 1322.975891] team0 (unregistering): Port device team_slave_0 removed [ 1322.985761] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1323.043744] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1323.108716] bond0 (unregistering): Released all slaves [ 1323.165085] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:27:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x29001) writev(r1, &(0x7f0000002540)=[{0x0}, {&(0x7f00000003c0)="f0", 0x1}], 0x2) 23:27:24 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(0xffffffffffffffff, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) open(0x0, 0x14103e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f0000000000)=0x1) sendfile(r1, r2, 0x0, 0x4e68d5f8) 23:27:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000900)={'broute\x00', 0x0, 0x3, 0xbe, [], 0x1, &(0x7f0000000800)=[{}], &(0x7f0000000840)=""/190}, &(0x7f0000000980)=0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc8}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000740)={0x7f, {{0xa, 0x4e21, 0xbbf, @remote}}}, 0x88) prctl$PR_SET_SECCOMP(0x16, 0xffd35818e0ae2a5d, &(0x7f0000000280)={0x4, &(0x7f00000000c0)=[{0x4f7, 0x81, 0x7f, 0x400}, {0x9, 0x4c, 0x3, 0x9}, {0x1b7, 0xf, 0x6, 0x6da3}, {0x4, 0x6, 0x6, 0xcc}]}) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x9, 0x200000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg(r3, &(0x7f0000000400)={&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x2, 0x4, 0x1, {0xa, 0x4e22, 0x6, @mcast1, 0x9}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000004c0)="01f298d2a3e11a7489ea55774dd76c8e6fbe73545a1721b651df469dac97f4a9708d416ed52232a920681788ec0e1c1110d5a0a91a2a378452666af806ddc026697b35c8ff7dc944416aedd2a8dcb781b023a914114d5567b03ffe10b280792211689ed3fa793ede0caa07600aa190d0bad20f390159ef1bb4776beae665c9e9444434950fe7acc4076a47795df1c6134843dbe04029f6b90236a61ec31aeb83b3ee55e094014cf729e21f2014474a376079c1072fd1b2636320ee11e08c7a", 0xbf}, {&(0x7f0000000a80)="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", 0xfa}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0x2c6}, 0x40) r4 = socket$bt_rfcomm(0x1f, 0xa0e262723456fc37, 0x3) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) fchown(r4, r5, r6) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000440)={0x5, 0x4963, 0xfffa, 0x100, 0x2, 0x7ff}) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r7 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = dup(r7) ioctl$PPPIOCGFLAGS1(r8, 0x8004745a, &(0x7f0000000040)) 23:27:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:24 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac", 0xc9, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 1323.657361] audit: type=1804 audit(1574033244.775:303): pid=19016 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir494082404/syzkaller.W9GFQI/10/bus" dev="sda1" ino=17201 res=1 23:27:24 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 23:27:24 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000280)) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010202000270f7f8", 0x16}], 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x3, 0xb9e, &(0x7f0000000080)="4891bd", 0x0, 0x3}) umount2(&(0x7f0000000140)='./file0\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) keyctl$assume_authority(0x10, 0x0) 23:27:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1323.808679] audit: type=1804 audit(1574033244.925:304): pid=19016 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir494082404/syzkaller.W9GFQI/10/bus" dev="sda1" ino=17201 res=1 23:27:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x24, 0x0, &(0x7f0000000000)) 23:27:25 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:25 executing program 5: 23:27:25 executing program 5: 23:27:25 executing program 2: [ 1324.048401] FAT-fs (loop3): Directory bread(block 513) failed [ 1324.057694] FAT-fs (loop3): Directory bread(block 514) failed [ 1324.070156] protocol 88fb is buggy, dev hsr_slave_0 [ 1324.075276] protocol 88fb is buggy, dev hsr_slave_1 [ 1324.086174] FAT-fs (loop3): Directory bread(block 515) failed 23:27:25 executing program 5: 23:27:25 executing program 2: [ 1324.112400] FAT-fs (loop3): Directory bread(block 516) failed [ 1324.154042] FAT-fs (loop3): Directory bread(block 517) failed [ 1324.188209] FAT-fs (loop3): Directory bread(block 518) failed [ 1324.217002] FAT-fs (loop3): Directory bread(block 519) failed [ 1324.258432] FAT-fs (loop3): Directory bread(block 520) failed [ 1324.275194] FAT-fs (loop3): Directory bread(block 521) failed [ 1324.284798] FAT-fs (loop3): Directory bread(block 522) failed [ 1324.310138] protocol 88fb is buggy, dev hsr_slave_0 [ 1324.315719] protocol 88fb is buggy, dev hsr_slave_1 23:27:25 executing program 4: 23:27:25 executing program 5: [ 1324.550281] protocol 88fb is buggy, dev hsr_slave_0 [ 1324.555443] protocol 88fb is buggy, dev hsr_slave_1 23:27:26 executing program 5: 23:27:26 executing program 2: 23:27:26 executing program 4: 23:27:26 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1325.350177] protocol 88fb is buggy, dev hsr_slave_0 [ 1325.355314] protocol 88fb is buggy, dev hsr_slave_1 [ 1325.590171] protocol 88fb is buggy, dev hsr_slave_0 [ 1325.595308] protocol 88fb is buggy, dev hsr_slave_1 [ 1326.180569] device bridge_slave_1 left promiscuous mode [ 1326.186164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1326.240998] device bridge_slave_0 left promiscuous mode [ 1326.246620] bridge0: port 1(bridge_slave_0) entered disabled state [ 1326.384391] device hsr_slave_1 left promiscuous mode [ 1326.424420] device hsr_slave_0 left promiscuous mode [ 1326.464712] team0 (unregistering): Port device team_slave_1 removed [ 1326.474799] team0 (unregistering): Port device team_slave_0 removed [ 1326.484393] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1326.534818] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1326.595093] bond0 (unregistering): Released all slaves [ 1328.281547] IPVS: ftp: loaded support on port[0] = 21 [ 1329.287572] chnl_net:caif_netlink_parms(): no params data found [ 1329.322390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.328803] bridge0: port 1(bridge_slave_0) entered disabled state [ 1329.335911] device bridge_slave_0 entered promiscuous mode [ 1329.343412] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.349783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.356891] device bridge_slave_1 entered promiscuous mode [ 1329.373938] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1329.383133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1329.399786] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1329.407271] team0: Port device team_slave_0 added [ 1329.412901] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1329.419968] team0: Port device team_slave_1 added [ 1329.425573] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1329.433101] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1329.492459] device hsr_slave_0 entered promiscuous mode [ 1329.540424] device hsr_slave_1 entered promiscuous mode [ 1329.580795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1329.587918] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1329.603071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.609564] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1329.616223] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.622687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1329.652090] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1329.658189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1329.666888] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1329.675836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1329.684284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1329.691225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.700793] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1329.707004] 8021q: adding VLAN 0 to HW filter on device team0 [ 1329.715799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1329.723494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.729828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1329.739438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1329.747672] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.754077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1329.771341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1329.779159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1329.791784] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1329.801707] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1329.814607] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1329.821265] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1329.828193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1329.836554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1329.844258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1329.856616] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1329.865065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1329.871878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1329.885370] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1330.280480] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:27:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:33 executing program 3: 23:27:33 executing program 2: 23:27:33 executing program 5: 23:27:33 executing program 4: 23:27:33 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:33 executing program 2: 23:27:33 executing program 5: 23:27:33 executing program 3: 23:27:33 executing program 4: 23:27:33 executing program 2: 23:27:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:33 executing program 3: 23:27:33 executing program 5: 23:27:33 executing program 4: 23:27:33 executing program 5: 23:27:33 executing program 3: [ 1332.310985] protocol 88fb is buggy, dev hsr_slave_0 [ 1332.316110] protocol 88fb is buggy, dev hsr_slave_1 [ 1332.390131] protocol 88fb is buggy, dev hsr_slave_0 [ 1332.395313] protocol 88fb is buggy, dev hsr_slave_1 [ 1332.630329] protocol 88fb is buggy, dev hsr_slave_0 [ 1332.635501] protocol 88fb is buggy, dev hsr_slave_1 23:27:33 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:33 executing program 4: 23:27:33 executing program 2: 23:27:33 executing program 5: 23:27:33 executing program 3: 23:27:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:34 executing program 3: 23:27:34 executing program 5: 23:27:34 executing program 4: getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) getpgid(0x0) 23:27:34 executing program 2: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r0, 0xba, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r1, &(0x7f0000000df0)=""/528, 0xfe06) r2 = gettid() r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x9000004}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xffffff7f, 0x1}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x8003, 0x2, 0x400}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000180)={0x5, 0xfffd, 0x0, 0x3, 0x332, 0x0, 0x3, 0x7, r5}, 0x20) close(0xffffffffffffffff) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000440)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd0\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\xd9\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/251) tkill(r2, 0x0) 23:27:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c, 0x9010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1332.983550] device bridge_slave_1 left promiscuous mode [ 1332.989175] bridge0: port 2(bridge_slave_1) entered disabled state 23:27:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) rmdir(0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) connect(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) bind$inet(0xffffffffffffffff, &(0x7f0000000200), 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000340)={@remote}, &(0x7f0000000700)=0xc) accept(r1, &(0x7f0000001b80)=@xdp, &(0x7f0000001c00)=0xfffffffffffffe5f) syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002540)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, r4}, 0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)}, {&(0x7f0000000580)}, {&(0x7f0000000240)}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a40)}], 0x7}}, {{&(0x7f0000001fc0)={0x2, 0x4e20, @local}, 0x10, 0x0, 0x0, &(0x7f0000002240)=ANY=[]}}], 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@tipc=@id, &(0x7f0000000180)=0x218) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x24000) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) [ 1333.081070] device bridge_slave_0 left promiscuous mode [ 1333.089073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.472916] device hsr_slave_1 left promiscuous mode [ 1333.525282] device hsr_slave_0 left promiscuous mode [ 1333.584465] team0 (unregistering): Port device team_slave_1 removed [ 1333.604356] team0 (unregistering): Port device team_slave_0 removed [ 1333.622983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1333.665151] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1333.670157] protocol 88fb is buggy, dev hsr_slave_0 [ 1333.677326] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.809640] bond0 (unregistering): Released all slaves 23:27:35 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='lo\x00') 23:27:35 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:35 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001040)='/dev/snapshot\x00', 0x1, 0x0) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f00000001c0)=0xfbfbcce1237b0cdb, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x8, 0x0, 0x10000, 0x7}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000002c0)={0x8, r5}) [ 1334.470136] protocol 88fb is buggy, dev hsr_slave_0 [ 1334.475496] protocol 88fb is buggy, dev hsr_slave_1 [ 1335.931448] IPVS: ftp: loaded support on port[0] = 21 [ 1336.866508] chnl_net:caif_netlink_parms(): no params data found [ 1336.907310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1336.913851] bridge0: port 1(bridge_slave_0) entered disabled state [ 1336.924837] device bridge_slave_0 entered promiscuous mode [ 1336.934175] bridge0: port 2(bridge_slave_1) entered blocking state [ 1336.944192] bridge0: port 2(bridge_slave_1) entered disabled state [ 1336.951410] device bridge_slave_1 entered promiscuous mode [ 1336.973853] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1336.983750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1337.000184] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1337.007305] team0: Port device team_slave_0 added [ 1337.013480] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1337.020876] team0: Port device team_slave_1 added [ 1337.032270] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1337.039699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1337.094009] device hsr_slave_0 entered promiscuous mode [ 1337.140413] device hsr_slave_1 entered promiscuous mode [ 1337.185584] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1337.193785] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1337.207812] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1337.238697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1337.247155] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1337.256113] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1337.263808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1337.271289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1337.283572] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1337.289670] 8021q: adding VLAN 0 to HW filter on device team0 [ 1337.300690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1337.307873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1337.316046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1337.323898] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.330293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1337.342090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1337.350990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1337.358153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1337.366302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1337.374085] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.380569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1337.394707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1337.401941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1337.413548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1337.420673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1337.431473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1337.438513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1337.446980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1337.458018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1337.466828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1337.474567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1337.482502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1337.499406] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1337.509380] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1337.519709] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1337.526487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1337.534858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1337.542491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1337.559476] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1337.567059] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1337.573399] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1337.580678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1337.591347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1338.081086] device bridge_slave_1 left promiscuous mode [ 1338.086822] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.131195] device bridge_slave_0 left promiscuous mode [ 1338.136740] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.191242] device bridge_slave_1 left promiscuous mode [ 1338.196989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.260815] device bridge_slave_0 left promiscuous mode [ 1338.267758] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.445248] device hsr_slave_1 left promiscuous mode [ 1338.493958] device hsr_slave_0 left promiscuous mode [ 1338.533859] team0 (unregistering): Port device team_slave_1 removed [ 1338.545151] team0 (unregistering): Port device team_slave_0 removed [ 1338.555950] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1338.595765] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1338.656790] bond0 (unregistering): Released all slaves [ 1338.773064] device hsr_slave_1 left promiscuous mode [ 1338.843240] device hsr_slave_0 left promiscuous mode [ 1338.883153] team0 (unregistering): Port device team_slave_1 removed [ 1338.895509] team0 (unregistering): Port device team_slave_0 removed [ 1338.905939] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1338.953724] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1339.045447] bond0 (unregistering): Released all slaves 23:27:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:40 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r0, 0xba, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r1, &(0x7f0000000df0)=""/528, 0xfe06) r2 = gettid() r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x9000004}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xffffff7f, 0x1}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x8003, 0x2, 0x400}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000180)={0x5, 0xfffd, 0x0, 0x3, 0x332, 0x0, 0x3, 0x7, r5}, 0x20) close(0xffffffffffffffff) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000440)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd0\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\xd9\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/251) tkill(r2, 0x0) 23:27:40 executing program 2: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r0, 0xba, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r1, &(0x7f0000000df0)=""/528, 0xfe06) r2 = gettid() r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x9000004}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xffffff7f, 0x1}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x8003, 0x2, 0x400}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000180)={0x5, 0xfffd, 0x0, 0x3, 0x332, 0x0, 0x3, 0x7, r5}, 0x20) close(0xffffffffffffffff) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000440)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd0\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\xd9\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/251) tkill(r2, 0x0) 23:27:40 executing program 4: syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x78, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x4000, 0x0, 0x0, 0x60], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @rand_addr="bb467fbc264c2d96b2c55265e0114569", [@dstopts={0x19, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0x19}, @ra, @jumbo]}, @routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}]}}}}}}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="ed8ed24112ccbe9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa21e76fc4d05e107ac82d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1bc0543978e0a05e200f2ef4214efd76167e74735bfeb92974cbd19010d67af6060487e9cc4cce9abfcaadd589f252c8b00b6391a0000000000000000002000000012b9ebda7b84b1b5abdcac51192d0ed2475acca17b353f17ebbf041d98dd132e41832df904bb33f721df"], 0xce) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) r2 = socket(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) io_setup(0x4aa, &(0x7f0000000280)) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r5}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r5, 0xc77, 0x2}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r5, 0x3f}, &(0x7f0000000040)=0x8) 23:27:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:40 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1339.225850] net_ratelimit: 2 callbacks suppressed [ 1339.225856] IPv6: addrconf: prefix option has invalid lifetime 23:27:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1339.910155] protocol 88fb is buggy, dev hsr_slave_0 [ 1339.915323] protocol 88fb is buggy, dev hsr_slave_1 [ 1339.990670] protocol 88fb is buggy, dev hsr_slave_0 [ 1339.995893] protocol 88fb is buggy, dev hsr_slave_1 23:27:41 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:41 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:41 executing program 4: openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) r1 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x10002, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x800c0910, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x10, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 1340.710116] protocol 88fb is buggy, dev hsr_slave_0 [ 1340.715250] protocol 88fb is buggy, dev hsr_slave_1 [ 1340.950142] protocol 88fb is buggy, dev hsr_slave_0 [ 1340.955293] protocol 88fb is buggy, dev hsr_slave_1 [ 1342.721794] IPVS: ftp: loaded support on port[0] = 21 [ 1343.603640] IPVS: ftp: loaded support on port[0] = 21 [ 1343.612800] chnl_net:caif_netlink_parms(): no params data found [ 1343.668316] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.675719] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.682877] device bridge_slave_0 entered promiscuous mode [ 1343.695588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.702099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.709172] device bridge_slave_1 entered promiscuous mode [ 1343.725705] IPVS: ftp: loaded support on port[0] = 21 [ 1343.744369] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1343.753931] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1343.774011] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1343.781310] team0: Port device team_slave_0 added [ 1343.787018] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1343.794891] team0: Port device team_slave_1 added [ 1343.804764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1343.818816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1343.894060] device hsr_slave_0 entered promiscuous mode [ 1343.940441] device hsr_slave_1 entered promiscuous mode [ 1343.993370] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1344.016247] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1344.049218] chnl_net:caif_netlink_parms(): no params data found [ 1344.090075] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.096835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1344.103524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.110698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.212062] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.218518] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.226568] device bridge_slave_0 entered promiscuous mode [ 1344.234657] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.241803] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.248851] device bridge_slave_1 entered promiscuous mode [ 1344.276315] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1344.285717] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1344.293684] chnl_net:caif_netlink_parms(): no params data found [ 1344.331007] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1344.338142] team0: Port device team_slave_0 added [ 1344.348535] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1344.356851] team0: Port device team_slave_1 added [ 1344.373900] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1344.380000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1344.386849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1344.395346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1344.422631] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1344.472551] device hsr_slave_0 entered promiscuous mode [ 1344.523771] device hsr_slave_1 entered promiscuous mode [ 1344.569974] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1344.577020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1344.584307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.591126] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.599288] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1344.606708] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.614728] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.622281] device bridge_slave_0 entered promiscuous mode [ 1344.628912] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1344.641934] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1344.648012] 8021q: adding VLAN 0 to HW filter on device team0 [ 1344.655662] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.662105] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.668982] device bridge_slave_1 entered promiscuous mode [ 1344.688808] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1344.705421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1344.713449] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1344.722866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1344.743597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1344.751692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1344.759200] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.765580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.775511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1344.783989] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1344.792118] team0: Port device team_slave_0 added [ 1344.801500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1344.809261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1344.816918] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.823285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1344.833377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1344.841582] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1344.848633] team0: Port device team_slave_1 added [ 1344.854749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1344.864834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1344.877479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1344.885603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1344.893561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1344.906262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1344.927034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1344.935559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1344.946080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1344.993089] device hsr_slave_0 entered promiscuous mode [ 1345.030558] device hsr_slave_1 entered promiscuous mode [ 1345.070496] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1345.077518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1345.088665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1345.098253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1345.108557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1345.116346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1345.124380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1345.134082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1345.142911] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1345.153328] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1345.159537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1345.167389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1345.176034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1345.184194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1345.217409] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1345.228403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1345.238948] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1345.246814] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1345.261806] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1345.269035] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1345.276479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1345.286528] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1345.294817] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1345.306756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1345.314933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1345.324878] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1345.331254] 8021q: adding VLAN 0 to HW filter on device team0 [ 1345.347892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1345.363108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1345.371725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1345.379355] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.385743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.401395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1345.412317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1345.419570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1345.430850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1345.438398] bridge0: port 2(bridge_slave_1) entered blocking state [ 1345.444792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1345.457791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1345.468675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1345.476135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1345.484653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1345.507529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1345.516433] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1345.522943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1345.529403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1345.540872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1345.548814] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1345.567769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1345.575263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1345.583825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1345.593558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1345.608225] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:27:46 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r0, 0xba, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r1, &(0x7f0000000df0)=""/528, 0xfe06) r2 = gettid() r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x9000004}, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xffffff7f, 0x1}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x8003, 0x2, 0x400}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000180)={0x5, 0xfffd, 0x0, 0x3, 0x332, 0x0, 0x3, 0x7, r5}, 0x20) close(0xffffffffffffffff) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000440)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd0\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\xd9\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/251) tkill(r2, 0x0) 23:27:46 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0xc8, 0x7, "e00ad8b06910eeff1ca0c3013b757f22952e5607a25bda08d8d542a1510da7d9b628ebac46d9348610981f19541b06c341d28fe36ab48dd433ce5fecd77e9b", 0x36}, 0x60) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8, 0x17, 0x101}]}}}]}, 0x3c}}, 0x0) [ 1345.629126] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1345.666852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1345.675738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1345.696528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1345.717561] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1345.734552] 8021q: adding VLAN 0 to HW filter on device team0 [ 1345.740957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1345.749047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1345.771279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1345.789421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1345.803721] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1345.815564] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1345.821906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1345.831704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1345.852552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1345.873122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1345.894685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1345.914947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.921396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.949531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1345.975905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1345.998788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1346.008205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1346.027277] bridge0: port 2(bridge_slave_1) entered blocking state [ 1346.033698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1346.055488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1346.076005] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1346.084632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1346.096228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1346.111611] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1346.122309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1346.140460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1346.147274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1346.171580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1346.193293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1346.200588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1346.208445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1346.231289] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1346.260250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1346.283225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1346.297173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1346.307470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1346.324258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1346.339896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1346.366951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1346.378456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1346.406123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1346.439111] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1346.449920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1346.481330] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1346.498255] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1346.512844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1346.522685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1346.544872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1346.800499] device bridge_slave_1 left promiscuous mode [ 1346.806059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1346.889511] device bridge_slave_0 left promiscuous mode [ 1346.896465] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.966065] device bridge_slave_1 left promiscuous mode [ 1346.980243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1347.161165] device bridge_slave_0 left promiscuous mode [ 1347.166821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1347.221967] device bridge_slave_1 left promiscuous mode [ 1347.229646] bridge0: port 2(bridge_slave_1) entered disabled state [ 1347.281646] device bridge_slave_0 left promiscuous mode [ 1347.287325] bridge0: port 1(bridge_slave_0) entered disabled state [ 1347.503667] device hsr_slave_1 left promiscuous mode [ 1347.544353] device hsr_slave_0 left promiscuous mode [ 1347.583474] team0 (unregistering): Port device team_slave_1 removed [ 1347.594779] team0 (unregistering): Port device team_slave_0 removed [ 1347.604969] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1347.655637] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1347.727910] bond0 (unregistering): Released all slaves [ 1347.811908] device hsr_slave_1 left promiscuous mode [ 1347.853285] device hsr_slave_0 left promiscuous mode [ 1347.913226] team0 (unregistering): Port device team_slave_1 removed [ 1347.924464] team0 (unregistering): Port device team_slave_0 removed [ 1347.934408] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1348.003814] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1348.085007] bond0 (unregistering): Released all slaves [ 1348.172692] device hsr_slave_1 left promiscuous mode [ 1348.213063] device hsr_slave_0 left promiscuous mode [ 1348.264829] team0 (unregistering): Port device team_slave_1 removed [ 1348.274851] team0 (unregistering): Port device team_slave_0 removed [ 1348.285288] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1348.325465] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1348.386306] bond0 (unregistering): Released all slaves 23:27:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x15, 0x0, 0x0, 0x8000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='gid_map\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x200) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x4008000) 23:27:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:49 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x40000) r1 = getegid() keyctl$chown(0x4, 0x0, 0x0, r1) r2 = geteuid() r3 = getegid() fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='\x00', 0x0, &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}], {0x4, 0x2}, [{0x8, 0x4}, {}, {0x8, 0x1}, {}, {0x8, 0x0, r3}, {0x8, 0x6, r4}]}, 0x5c, 0x1) r5 = geteuid() r6 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='\x00', 0x0, &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r5}], {0x4, 0x2}, [{0x8, 0x4}, {}, {0x8, 0x1}, {}, {0x8, 0x0, r6}, {0x8, 0x6, r7}]}, 0x5c, 0x1) r8 = geteuid() r9 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='\x00', 0x0, &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r8}], {0x4, 0x2}, [{0x8, 0x4}, {}, {0x8, 0x1}, {}, {0x8, 0x0, r9}, {0x8, 0x6, r10}]}, 0x5c, 0x1) r11 = geteuid() r12 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='\x00', 0x0, &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r11}], {0x4, 0x2}, [{0x8, 0x4}, {}, {0x8, 0x1}, {}, {0x8, 0x0, r12}, {0x8, 0x6, r13}]}, 0x5c, 0x1) r14 = getegid() keyctl$chown(0x4, 0x0, 0x0, r14) r15 = geteuid() r16 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='\x00', 0x0, &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r15}], {0x4, 0x2}, [{0x8, 0x4}, {}, {0x8, 0x1}, {}, {0x8, 0x0, r16}, {0x8, 0x6, r17}]}, 0x5c, 0x1) getgroups(0x8, &(0x7f00000001c0)=[r1, r3, r7, r9, r12, r14, 0xee01, r16]) ioctl$TUNSETGROUP(r0, 0x400454ce, r18) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r19 = getpid() ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) sched_setattr(r19, &(0x7f0000000240)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r20 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r20, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r22, 0x407, 0x0) write(r22, &(0x7f0000000680)="ff5b93baf4715971ba778a4091bf32a5307d1aad95db841680c544d506ab1c3405176a92ebe5ce0025e269e33dba850c0edff31990e83f65d40e8aec1f8801132a4088456b3f9166215a20ce4113818fe8668752a06696602189d19eb27eeb7c7a8fe69d0e65a052a93b5c4cf71bc11c4bc0bc7fbc5637850e7cf553dc9683e2a77d09196b818171d8e2b85add4e45494bc588edfedd7bd8045fa963bdd79c6885fb32e67153a5050367a53907b55917d7f298c40364e253", 0xffffffe1) socketpair$unix(0x1, 0x5, 0x0, 0x0) vmsplice(r21, &(0x7f0000000140)=[{&(0x7f0000000480)="6ed9b7255278daa197d8629a72f16862105cdfe0cc61253b50da885c24b09e447685d532a842b8a17849c17df8fe60ab62944bd39c79a03119293d44ae215f1249ebcdd89e9ed2f846fac783a8444e9d85cb0e27febfd949ff5534a0", 0xffffffbb}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) sched_setattr(0x0, 0x0, 0x0) r23 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x2) write(r23, &(0x7f00000003c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a99d58d2267958d4c5320b836f26e80fff0f48bb7a9dbe30fcc0ee3c0d19", 0x5e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r23, 0x0) sendfile(r23, r23, &(0x7f0000000200), 0xff8) socket(0xa, 0x2, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x2}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r24, 0x40082406, &(0x7f0000000180)='Z\x00') open(&(0x7f0000000440)='./file0\x00', 0xa2b40, 0x24) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)) r25 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="77827cf354677d4e26f3b1", @ANYRES16=r25, @ANYBLOB="e54e000000000000000008000000180004001400010062726f6164634273742d6c"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000b40)=ANY=[@ANYBLOB="0031c96a8341a5e1d8b41299c906fc4906e82771431024ee3dccf5a7792b", @ANYRES16=r25, @ANYBLOB="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"/937], 0x3b4}}, 0x20000000) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x2, 0x4) 23:27:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:49 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() r1 = open(0x0, 0x4842, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) timer_create(0x0, 0x0, 0x0) sched_setattr(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/76, 0x4c}, {&(0x7f0000000300)=""/30, 0x1e}], 0x2, &(0x7f0000000600)=""/14, 0xe}, 0x1}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="c39cd8f7f46901ec12861dd16bd6f6a1a920ff9258caa4707b46f0aa882d9e3ac541d7add3ea296d4f00ec54de5556c66b14461bf3b97e92f846e984cb86b851da5a0387734d15509f213ba0c227aafc49e0f69e00496cd04f18a0bece40468e2a5c37ad3a056a093c0581469868a9a5d476aabed9eb1e5c6d252b6f0529047de780a6b83253a167fb8e7469510000000000ac3c09c987bb42464404b305acf3e3aa2a45c630fa566b8b98b6e4e8b10830b494fb420e85268b62ddc3ee2e45b9caa0097aa43eaf432ce29465c900133d5a81f814d3c98f8a2489f8514ffc7cce64f643039da92ba29da0dd4c53765e53c193f6a110630b17ae643166dd4b8c3a201b7ae5edba6f6b407005a3aa21c504dcea80b0b1f8daf67d9a86551529ca1906a17d0c2ba0d2f36a56e563d082438b11e6a54bbadc82ded919", @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB="124ab56234acee5883879ae998040dbff45dfed618c05d9fb24af73cf46125dafc8b8e1b689d4fdc454dd642a9b869699871263aba6c3ed4481efecf66defd37a643536024a65115bcf1746507c97247382df78beacd83e97c8c31dd698b4ce94f0e70707d434c2f3cb5851ee7b833c21cbb89e101f7", @ANYRESDEC=0x0]) fcntl$setpipe(r3, 0x407, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x210000, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x3, 0x88) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000000), 0x4) pipe(0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r6, 0x0, 0x20000102000007) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440)={0x8, "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", 0x1000}, 0x1006) 23:27:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:27:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1348.950124] protocol 88fb is buggy, dev hsr_slave_0 [ 1348.955253] protocol 88fb is buggy, dev hsr_slave_1 [ 1349.270167] protocol 88fb is buggy, dev hsr_slave_0 [ 1349.275330] protocol 88fb is buggy, dev hsr_slave_1 23:27:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:50 executing program 5: r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="778741f35c00000000918f874555c11fe0a8a4ec52e633dc11b51bce84705d99f7708e7bc8f81d9b1411040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3cd8372c229e4f268cf85e3ed17c5bde8842888700", @ANYRES16=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x68, r2, 0x80, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}]}, 0x68}}, 0x1a71b4e8b90b5632) r3 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "5f4cf8669152e8dd77a5bf0805cfc342535000"}) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(0x0, 0x0) [ 1349.617111] loop_reread_partitions: partition scan of loop0 (i« ‹gƒ—!NìŸðÐ̇së²ÏØ›R1z„]=÷YÒ€­Sø‡ÓØù¿B¸‰úÛ™¥Þüy½k #“œI") failed (rc=-16) [ 1349.651349] print_req_error: I/O error, dev loop0, sector 0 [ 1349.657323] print_req_error: I/O error, dev loop0, sector 0 [ 1349.663424] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.671943] print_req_error: I/O error, dev loop0, sector 0 [ 1349.677716] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.700427] print_req_error: I/O error, dev loop0, sector 0 [ 1349.706207] Buffer I/O error on dev loop0, logical block 0, async page read 23:27:50 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{0x0, 0x0, 0x0}, 0x800}, {{0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {&(0x7f00000014c0)=""/210, 0xd2}], 0x2}}], 0x2, 0x0, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/192) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) [ 1349.713555] print_req_error: I/O error, dev loop0, sector 0 [ 1349.719286] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.726674] print_req_error: I/O error, dev loop0, sector 0 [ 1349.732442] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.733296] print_req_error: I/O error, dev loop0, sector 0 [ 1349.745446] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.752663] protocol 88fb is buggy, dev hsr_slave_0 [ 1349.752712] protocol 88fb is buggy, dev hsr_slave_1 [ 1349.763830] print_req_error: I/O error, dev loop0, sector 0 [ 1349.769566] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.777142] print_req_error: I/O error, dev loop0, sector 0 [ 1349.782940] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.790444] print_req_error: I/O error, dev loop0, sector 0 [ 1349.796182] Buffer I/O error on dev loop0, logical block 0, async page read [ 1349.803572] Buffer I/O error on dev loop0, logical block 0, async page read [ 1352.611393] IPVS: ftp: loaded support on port[0] = 21 [ 1353.581583] IPVS: ftp: loaded support on port[0] = 21 [ 1353.593016] chnl_net:caif_netlink_parms(): no params data found [ 1353.657197] IPVS: ftp: loaded support on port[0] = 21 [ 1353.686408] bridge0: port 1(bridge_slave_0) entered blocking state [ 1353.693323] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.700802] device bridge_slave_0 entered promiscuous mode [ 1353.709413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1353.715877] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.722938] device bridge_slave_1 entered promiscuous mode [ 1353.783246] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1353.804899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1353.812780] chnl_net:caif_netlink_parms(): no params data found [ 1353.849600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1353.857097] team0: Port device team_slave_0 added [ 1353.872229] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1353.879378] team0: Port device team_slave_1 added [ 1353.890206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1353.902383] IPVS: ftp: loaded support on port[0] = 21 [ 1353.915521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1353.980292] bridge0: port 1(bridge_slave_0) entered blocking state [ 1353.986958] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.994626] device bridge_slave_0 entered promiscuous mode [ 1354.002402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1354.008771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1354.015839] device bridge_slave_1 entered promiscuous mode [ 1354.102528] device hsr_slave_0 entered promiscuous mode [ 1354.140457] device hsr_slave_1 entered promiscuous mode [ 1354.180465] chnl_net:caif_netlink_parms(): no params data found [ 1354.189360] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1354.212491] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1354.230122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1354.247301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1354.287994] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.294729] bridge0: port 1(bridge_slave_0) entered disabled state [ 1354.302180] device bridge_slave_0 entered promiscuous mode [ 1354.322578] bridge0: port 2(bridge_slave_1) entered blocking state [ 1354.328950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1354.335591] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.341976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1354.349451] bridge0: port 2(bridge_slave_1) entered blocking state [ 1354.356277] bridge0: port 2(bridge_slave_1) entered disabled state [ 1354.364124] device bridge_slave_1 entered promiscuous mode [ 1354.375950] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1354.383560] team0: Port device team_slave_0 added [ 1354.409905] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1354.417599] team0: Port device team_slave_1 added [ 1354.428235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1354.437088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1354.446655] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1354.495332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1354.533284] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1354.540944] team0: Port device team_slave_0 added [ 1354.546286] chnl_net:caif_netlink_parms(): no params data found [ 1354.593755] device hsr_slave_0 entered promiscuous mode [ 1354.630539] device hsr_slave_1 entered promiscuous mode [ 1354.681168] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1354.688459] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1354.696679] team0: Port device team_slave_1 added [ 1354.705559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1354.713428] bridge0: port 1(bridge_slave_0) entered disabled state [ 1354.724175] bridge0: port 2(bridge_slave_1) entered disabled state [ 1354.749233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1354.760925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1354.767567] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1354.784668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1354.802619] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1354.825136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1354.832436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1354.849007] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1354.855728] 8021q: adding VLAN 0 to HW filter on device team0 [ 1354.913185] device hsr_slave_0 entered promiscuous mode [ 1354.950419] device hsr_slave_1 entered promiscuous mode [ 1355.015962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1355.023944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1355.033570] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1355.042130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1355.057962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1355.066861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1355.074791] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.081175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1355.092539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1355.101041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.107486] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.114963] device bridge_slave_0 entered promiscuous mode [ 1355.122027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1355.129745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1355.137975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.144402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1355.158957] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.165414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.172838] device bridge_slave_1 entered promiscuous mode [ 1355.193553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1355.202578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1355.211446] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1355.220485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1355.243607] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1355.250963] team0: Port device team_slave_0 added [ 1355.258024] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1355.265420] team0: Port device team_slave_1 added [ 1355.281099] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1355.287923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1355.296058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1355.306391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1355.335177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1355.346197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1355.392511] device hsr_slave_0 entered promiscuous mode [ 1355.430509] device hsr_slave_1 entered promiscuous mode [ 1355.471294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1355.478750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1355.490126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1355.512099] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1355.525184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1355.534506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1355.544782] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1355.553938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1355.562542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1355.570171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1355.577665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1355.597384] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1355.606610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1355.616824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1355.626414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1355.634686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1355.659356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1355.667655] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1355.674003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1355.689921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1355.698017] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1355.711580] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1355.724368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1355.731408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1355.741780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1355.752369] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1355.762362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1355.769799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1355.777105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1355.789690] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1355.799196] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1355.805698] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.815815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1355.823030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1355.831885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1355.843390] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1355.849477] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.857407] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1355.866767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1355.875726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1355.883552] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.890152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1355.898814] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1355.908350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1355.918921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1355.927664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1355.935434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1355.942764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1355.949904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1355.957826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1355.965588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.971985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1355.980300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1355.993786] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1355.999939] 8021q: adding VLAN 0 to HW filter on device team0 [ 1356.007114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1356.021182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1356.029733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1356.036148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1356.043845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1356.052906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1356.061936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1356.077192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1356.091784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1356.099773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1356.108824] bridge0: port 2(bridge_slave_1) entered blocking state [ 1356.115255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1356.125140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1356.134206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1356.149850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1356.158164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1356.168021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1356.177252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1356.184400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1356.192793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1356.200919] bridge0: port 1(bridge_slave_0) entered blocking state [ 1356.207267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1356.214655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1356.223595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1356.238056] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1356.258619] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1356.273020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1356.280610] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1356.287596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1356.295519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1356.303825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1356.315415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1356.329025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1356.336987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1356.345822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1356.354570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1356.368028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1356.376500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1356.385199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1356.393363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1356.399736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1356.407055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1356.415088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1356.424642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1356.433603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1356.444630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1356.453299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1356.461464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1356.472324] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1356.479997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1356.489452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1356.498477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1356.506744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1356.514457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1356.522154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1356.529780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1356.543769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1356.554590] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1356.563783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1356.571214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1356.578941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1356.587617] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1356.597830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1356.614473] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1356.621371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1356.629421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1356.630389] protocol 88fb is buggy, dev hsr_slave_0 [ 1356.641235] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1356.641570] protocol 88fb is buggy, dev hsr_slave_1 [ 1356.647531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1356.661709] device bridge_slave_1 left promiscuous mode [ 1356.667290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1356.680161] protocol 88fb is buggy, dev hsr_slave_0 [ 1356.685290] protocol 88fb is buggy, dev hsr_slave_1 [ 1356.711865] device bridge_slave_0 left promiscuous mode [ 1356.717571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1356.760268] protocol 88fb is buggy, dev hsr_slave_0 [ 1356.765425] protocol 88fb is buggy, dev hsr_slave_1 [ 1356.772346] device bridge_slave_1 left promiscuous mode [ 1356.777946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1356.800202] protocol 88fb is buggy, dev hsr_slave_0 [ 1356.805429] protocol 88fb is buggy, dev hsr_slave_1 [ 1356.840814] device bridge_slave_0 left promiscuous mode [ 1356.846352] bridge0: port 1(bridge_slave_0) entered disabled state [ 1356.880384] protocol 88fb is buggy, dev hsr_slave_0 [ 1356.885568] protocol 88fb is buggy, dev hsr_slave_1 [ 1356.993598] device hsr_slave_1 left promiscuous mode [ 1357.035085] device hsr_slave_0 left promiscuous mode [ 1357.075446] team0 (unregistering): Port device team_slave_1 removed [ 1357.088309] team0 (unregistering): Port device team_slave_0 removed [ 1357.098603] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1357.133428] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1357.195680] bond0 (unregistering): Released all slaves [ 1357.302070] device hsr_slave_1 left promiscuous mode [ 1357.343129] device hsr_slave_0 left promiscuous mode [ 1357.394561] team0 (unregistering): Port device team_slave_1 removed [ 1357.404750] team0 (unregistering): Port device team_slave_0 removed [ 1357.415232] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1357.455380] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1357.535509] bond0 (unregistering): Released all slaves [ 1357.567143] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1357.575491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1357.587251] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1357.594491] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1357.601327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1357.608961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 23:27:58 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1357.637602] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1357.646713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1357.680758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1357.687922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1357.696214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1357.703948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1357.711783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1357.721159] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1357.730337] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1357.737108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1357.752874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1357.761806] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1357.767888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1357.784170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1357.812870] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1357.826939] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1357.839454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1357.852705] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1357.866724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1358.258545] audit: type=1804 audit(1574033279.375:305): pid=19408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir524515945/syzkaller.U5dP1R/0/bus" dev="sda1" ino=16978 res=1 23:27:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x8000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x4, 0x8005}, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffff000000001, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x4002, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000340), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) futex(&(0x7f0000000180)=0x2, 0x81, 0x2, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)=0x1, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 23:27:59 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:59 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:27:59 executing program 4: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000040)="c9f5b8f4ef", 0x5, 0xfffffffffffffffe) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x54c0a1a0c77a4b20, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000400)={0x9, 0xfffffffb, 0x2, 0x1f, &(0x7f0000000240)=""/31, 0x46, &(0x7f0000000340)=""/70, 0x2c, &(0x7f00000002c0)=""/44}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) semget$private(0x0, 0x2, 0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000051ff0)={0x2000000000003}, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) syz_mount_image$minix(&(0x7f0000000500)='minix\x00', &(0x7f0000000540)='./file0\x00', 0x4, 0x3, &(0x7f0000000780)=[{&(0x7f0000000580)="50bfa70c01a41c92a1fe359b383e8d214e349487beda9ace8792d3fe3310d7922b54eaa730e21ab9c9ec8473ef02bde00cbfa42f06500722449c29c0e3ebb8f43132a184c0539b19e9b05635771bd9a83bd91d5b2c12493797449e4abc5b28826a307c4b4e89e5e6e6232f75fe8c23f6a1bd7f3719c68aa51911b944186906b7e68bbaadb31ce67e830009e5a9ad20199974c565869812df891209e93c5e398d33fe12972f9947d50c3b59723fafb3", 0xaf, 0x2}, {&(0x7f0000000640)="71a0d5cca31272f9574a23af4201fae0fc17d51cfbd19552217b3b6239c57ae037eb8149bb532e343f47ea71405f725b32121ff16653ef6ea396a21e7bbf5c2fd17f4e98dc3e9e418ec66abf32041118b00b6f33d4c23af5f857634e8057e0fcca2cbea367c72dccea844df8ed6f66380165912a495ffc23950f3df14bdd6123b5", 0x81, 0x200}, {&(0x7f0000000700)="243a5ceef0d1cbb3132fb781610dbbf85963e3377e241456ab27cf989ebbb42ee00c1fc584d11b5fc5749dde406668379c899ae0baafb554b5f95a21726a311f575b6860fb20b3964a7e58585fe584f6b884155b3e5a67d3a8aab40f0c3159253de816a13aaf5ef83b2f12d9fa6e8acc6b9f819619badbf5335ec7dc300a", 0x7e, 0x6}], 0x800000, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r6, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xa2bd1d5677b481f6, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r7, r8, 0x0, 0x3, &(0x7f0000000480)='syz', 0xffffffffffffffff}, 0x30) 23:28:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) socket$inet(0x2, 0x2, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={0xffffffffffffffff, 0x0, &(0x7f0000000400)=""/66, 0x8}, 0x20) r4 = socket(0x10, 0x4008000000803, 0x0) sendto(r4, &(0x7f0000000600)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000440)=[{{0x0, 0xffffffffffffffc7, 0x0, 0x0, &(0x7f0000000100)=""/231, 0xffffffffffffff42}}], 0x400000000000173, 0x0, 0x0) 23:28:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1358.893920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1358.900675] bridge0: port 1(bridge_slave_0) entered disabled state [ 1358.916554] MINIX-fs: unable to read superblock 23:28:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x8000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x4, 0x8005}, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffff000000001, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x4002, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000340), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) futex(&(0x7f0000000180)=0x2, 0x81, 0x2, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)=0x1, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 23:28:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x8000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x4, 0x8005}, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffff000000001, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x4002, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000340), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) futex(&(0x7f0000000180)=0x2, 0x81, 0x2, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)=0x1, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 23:28:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x8000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x4, 0x8005}, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffff000000001, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x4002, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000340), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) futex(&(0x7f0000000180)=0x2, 0x81, 0x2, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)=0x1, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 23:28:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x8000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x4, 0x8005}, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffff000000001, 0xffffffffffffffff, 0x8) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x4002, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000340), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) futex(&(0x7f0000000180)=0x2, 0x81, 0x2, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)=0x1, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 23:28:00 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1359.704743] MINIX-fs: unable to read superblock [ 1359.737409] print_req_error: 113 callbacks suppressed [ 1359.737416] print_req_error: I/O error, dev loop0, sector 0 [ 1359.748585] buffer_io_error: 112 callbacks suppressed [ 1359.748592] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.770867] print_req_error: I/O error, dev loop0, sector 0 [ 1359.776699] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:00 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r6, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:00 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0xd4, 0x0, 0x0, 0x1}}, 0xe) 23:28:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000240), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$inet6(r1, &(0x7f0000001640)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000003c0)="a42db4d9c95b07bea89e1fd656a09ad2e50f0e3b56b2c52803c751ec91f26b19b9a23f5279776fb35330331f95362c5ef1b291", 0x33}, {&(0x7f0000000480)="323964137265b0fdc784512787b030fccdc554a02e8662d7a151aa56e3069d004b13650e804f9b126ae7ca7131b628f5292d1b4fea", 0x35}, {&(0x7f0000000580)='^?', 0x2}, {&(0x7f00000005c0)="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", 0x1000}], 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000003f0000e3280009449b7a9f604d0000000000000000000000000013d0d28ce1eab9007850ff582b364d97115052d77af7d38714275b3c1f72a83122f5bdf122c507bf38c1dcf7c542727149695e8420bb54edf6adf00d3fc78f6283f4ac9aa700f86b38f68fd3a6b39c83426a9a7ebc5f0a3eadc04761c144f561189e152b1cf84bab65cf50591d1773717e54aa446912600b93cbf47e9c69e0eea31be1edd0a44b8a0aca4a0133e00fbba8ff6fb8da803e5cff760d52c5e3b48ae604ff74ff4414"], 0xa7}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3a) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r6, 0x2008002) sendfile(r5, r6, 0x0, 0x8482) socket$inet6(0xa, 0x3, 0x3a) [ 1359.784325] print_req_error: I/O error, dev loop0, sector 0 [ 1359.790252] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.809005] print_req_error: I/O error, dev loop0, sector 0 [ 1359.814981] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.822560] print_req_error: I/O error, dev loop0, sector 0 [ 1359.828342] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.840975] print_req_error: I/O error, dev loop0, sector 0 [ 1359.846762] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.855339] print_req_error: I/O error, dev loop0, sector 0 [ 1359.862183] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.870918] print_req_error: I/O error, dev loop0, sector 0 [ 1359.876847] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.889739] print_req_error: I/O error, dev loop0, sector 0 [ 1359.895585] Buffer I/O error on dev loop0, logical block 0, async page read [ 1359.903036] print_req_error: I/O error, dev loop0, sector 0 [ 1359.908794] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:01 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000540)={0x9b7, {{0x2, 0x4e24, @multicast2}}}, 0x88) pipe(0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x10, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/184, 0xb8, 0x40012500, 0x0, 0x0) 23:28:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpgrp(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file1\x00', 0x110000, 0x0) r2 = perf_event_open(0x0, r0, 0x0, r1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x0) r4 = dup(r3) dup2(r4, r2) ioctl(r4, 0xffffffff, &(0x7f0000000000)="58eb45f38293176fc25eca20ecf1b989d186730f22c3132d7ce9235a0b72a00266457a6e5376") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x138) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x0, 0x0, 0x4, 0xf, 0x6, 0x0, 0x0, 0xab}) r5 = socket$inet(0x2, 0x80001, 0x0) dup(r5) socket(0x5, 0x100001, 0x40) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000100)=0x5afd, 0xffffffffffffff5f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x4c2) r6 = socket(0x0, 0x2, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffe3a) socket(0x1, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000fffffff900000600000014001100fe800000feffffffffffffff000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="4fa7d3682767afecada61759cadaaf94aef45f5beaaa1ed3157556cb370120ff8927aff69f29f160bc91c0ac2a6a039d25ed42f4d1f052077a34a2a10b59f5c401c7a5cb7cd04709047f56f5fcddd3762c5b3b51e22c34e666bef388d8ce40ff89baec042e802ca25718efdd6db6e2465d384df81bdbc0afe7d9954ef77e0724a866ee97802b8de165eb11e827c4b5e3d17fbeab3ab62a1a3f", @ANYRES32, @ANYRES32, @ANYBLOB="fffffff6000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e914ffff000009000000000000000000008000000000610b0000000000007f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd7000080000000200", @ANYRES64=r7, @ANYBLOB="000000000000000100000086ec17f8c5d9e5d0f98d37384935d2fc6c0e831f7c1aac3a75ee52cae83b4e7f15616a4ac84acb5c1d7151d2f12a82f9bb904ca6f688f7cca7e7640f1140547be7fd"], 0x8}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 23:28:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1362.301177] device bridge_slave_1 left promiscuous mode [ 1362.306768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1362.361134] device bridge_slave_0 left promiscuous mode [ 1362.366706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.421759] device bridge_slave_1 left promiscuous mode [ 1362.427251] bridge0: port 2(bridge_slave_1) entered disabled state [ 1362.471351] device bridge_slave_0 left promiscuous mode [ 1362.477202] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.623374] device hsr_slave_1 left promiscuous mode [ 1362.674443] device hsr_slave_0 left promiscuous mode [ 1362.714287] team0 (unregistering): Port device team_slave_1 removed [ 1362.725836] team0 (unregistering): Port device team_slave_0 removed [ 1362.735506] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1362.783556] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1362.853618] bond0 (unregistering): Released all slaves [ 1362.952071] device hsr_slave_1 left promiscuous mode [ 1363.004260] device hsr_slave_0 left promiscuous mode [ 1363.045297] team0 (unregistering): Port device team_slave_1 removed [ 1363.055369] team0 (unregistering): Port device team_slave_0 removed [ 1363.066172] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1363.115175] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1363.173646] bond0 (unregistering): Released all slaves [ 1365.751511] IPVS: ftp: loaded support on port[0] = 21 [ 1366.532311] IPVS: ftp: loaded support on port[0] = 21 [ 1366.543691] chnl_net:caif_netlink_parms(): no params data found [ 1366.607946] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.614792] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.621886] device bridge_slave_0 entered promiscuous mode [ 1366.634842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.641347] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.648256] device bridge_slave_1 entered promiscuous mode [ 1366.668146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1366.677442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1366.705401] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1366.713104] team0: Port device team_slave_0 added [ 1366.721040] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1366.728104] team0: Port device team_slave_1 added [ 1366.733884] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1366.756506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1366.854006] device hsr_slave_0 entered promiscuous mode [ 1366.900474] device hsr_slave_1 entered promiscuous mode [ 1366.943074] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1366.949799] chnl_net:caif_netlink_parms(): no params data found [ 1366.964102] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1366.986446] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.992949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1366.999657] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.006071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.032664] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.039105] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.046293] device bridge_slave_0 entered promiscuous mode [ 1367.054219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.060769] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.067676] device bridge_slave_1 entered promiscuous mode [ 1367.087568] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1367.097576] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1367.120655] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1367.127838] team0: Port device team_slave_0 added [ 1367.133836] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1367.141096] team0: Port device team_slave_1 added [ 1367.146724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1367.154481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1367.214685] device hsr_slave_0 entered promiscuous mode [ 1367.270744] device hsr_slave_1 entered promiscuous mode [ 1367.331591] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1367.339110] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1367.357636] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.364073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.370728] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.377312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.406305] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1367.412828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1367.426393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1367.437763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1367.445189] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.452243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.459441] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.466241] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.475785] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1367.482239] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.493290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1367.501110] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.507607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.515469] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1367.529764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1367.538684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1367.548800] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1367.555543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1367.563781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1367.571520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.577870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.587353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1367.599148] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1367.605795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1367.614048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1367.621465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1367.630788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1367.639583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1367.647480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1367.655422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1367.664591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1367.674589] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1367.681312] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.687452] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1367.695417] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1367.705354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1367.713001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1367.723602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1367.731412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1367.739430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1367.747329] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.753753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.763721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1367.772631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1367.780240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1367.789407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1367.797850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1367.806550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1367.814171] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.820701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.829822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1367.839467] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1367.849879] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1367.856099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1367.865033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1367.872321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1367.879871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1367.887646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1367.904413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1367.912053] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1367.918739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1367.927919] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1367.939561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1367.946854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1367.955106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1367.963805] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1367.973337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1367.981248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1367.991729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1368.000566] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1368.007847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1368.015729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1368.024971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1368.033643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1368.041556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1368.051230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1368.059669] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1368.075536] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1368.082351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1368.090644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1368.098563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1368.114372] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1368.122883] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1368.129270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1368.137613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1368.148090] 8021q: adding VLAN 0 to HW filter on device batadv0 23:28:10 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpgrp(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file1\x00', 0x110000, 0x0) r2 = perf_event_open(0x0, r0, 0x0, r1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x0) r4 = dup(r3) dup2(r4, r2) ioctl(r4, 0xffffffff, &(0x7f0000000000)="58eb45f38293176fc25eca20ecf1b989d186730f22c3132d7ce9235a0b72a00266457a6e5376") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x138) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x0, 0x0, 0x4, 0xf, 0x6, 0x0, 0x0, 0xab}) r5 = socket$inet(0x2, 0x80001, 0x0) dup(r5) socket(0x5, 0x100001, 0x40) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000100)=0x5afd, 0xffffffffffffff5f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x4c2) r6 = socket(0x0, 0x2, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffe3a) socket(0x1, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000fffffff900000600000014001100fe800000feffffffffffffff000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="4fa7d3682767afecada61759cadaaf94aef45f5beaaa1ed3157556cb370120ff8927aff69f29f160bc91c0ac2a6a039d25ed42f4d1f052077a34a2a10b59f5c401c7a5cb7cd04709047f56f5fcddd3762c5b3b51e22c34e666bef388d8ce40ff89baec042e802ca25718efdd6db6e2465d384df81bdbc0afe7d9954ef77e0724a866ee97802b8de165eb11e827c4b5e3d17fbeab3ab62a1a3f", @ANYRES32, @ANYRES32, @ANYBLOB="fffffff6000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e914ffff000009000000000000000000008000000000610b0000000000007f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd7000080000000200", @ANYRES64=r7, @ANYBLOB="000000000000000100000086ec17f8c5d9e5d0f98d37384935d2fc6c0e831f7c1aac3a75ee52cae83b4e7f15616a4ac84acb5c1d7151d2f12a82f9bb904ca6f688f7cca7e7640f1140547be7fd"], 0x8}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 23:28:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:10 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:10 executing program 4: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x105040) rt_sigsuspend(&(0x7f0000000000), 0x8) 23:28:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpgrp(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file1\x00', 0x110000, 0x0) r2 = perf_event_open(0x0, r0, 0x0, r1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x0) r4 = dup(r3) dup2(r4, r2) ioctl(r4, 0xffffffff, &(0x7f0000000000)="58eb45f38293176fc25eca20ecf1b989d186730f22c3132d7ce9235a0b72a00266457a6e5376") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x138) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x0, 0x0, 0x4, 0xf, 0x6, 0x0, 0x0, 0xab}) r5 = socket$inet(0x2, 0x80001, 0x0) dup(r5) socket(0x5, 0x100001, 0x40) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000100)=0x5afd, 0xffffffffffffff5f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x4c2) r6 = socket(0x0, 0x2, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffe3a) socket(0x1, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000fffffff900000600000014001100fe800000feffffffffffffff000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="4fa7d3682767afecada61759cadaaf94aef45f5beaaa1ed3157556cb370120ff8927aff69f29f160bc91c0ac2a6a039d25ed42f4d1f052077a34a2a10b59f5c401c7a5cb7cd04709047f56f5fcddd3762c5b3b51e22c34e666bef388d8ce40ff89baec042e802ca25718efdd6db6e2465d384df81bdbc0afe7d9954ef77e0724a866ee97802b8de165eb11e827c4b5e3d17fbeab3ab62a1a3f", @ANYRES32, @ANYRES32, @ANYBLOB="fffffff6000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e914ffff000009000000000000000000008000000000610b0000000000007f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd7000080000000200", @ANYRES64=r7, @ANYBLOB="000000000000000100000086ec17f8c5d9e5d0f98d37384935d2fc6c0e831f7c1aac3a75ee52cae83b4e7f15616a4ac84acb5c1d7151d2f12a82f9bb904ca6f688f7cca7e7640f1140547be7fd"], 0x8}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 23:28:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpgrp(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file1\x00', 0x110000, 0x0) r2 = perf_event_open(0x0, r0, 0x0, r1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x0) r4 = dup(r3) dup2(r4, r2) ioctl(r4, 0xffffffff, &(0x7f0000000000)="58eb45f38293176fc25eca20ecf1b989d186730f22c3132d7ce9235a0b72a00266457a6e5376") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x138) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x0, 0x0, 0x4, 0xf, 0x6, 0x0, 0x0, 0xab}) r5 = socket$inet(0x2, 0x80001, 0x0) dup(r5) socket(0x5, 0x100001, 0x40) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000100)=0x5afd, 0xffffffffffffff5f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x4c2) r6 = socket(0x0, 0x2, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffe3a) socket(0x1, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000fffffff900000600000014001100fe800000feffffffffffffff000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000002c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="4fa7d3682767afecada61759cadaaf94aef45f5beaaa1ed3157556cb370120ff8927aff69f29f160bc91c0ac2a6a039d25ed42f4d1f052077a34a2a10b59f5c401c7a5cb7cd04709047f56f5fcddd3762c5b3b51e22c34e666bef388d8ce40ff89baec042e802ca25718efdd6db6e2465d384df81bdbc0afe7d9954ef77e0724a866ee97802b8de165eb11e827c4b5e3d17fbeab3ab62a1a3f", @ANYRES32, @ANYRES32, @ANYBLOB="fffffff6000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e914ffff000009000000000000000000008000000000610b0000000000007f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd7000080000000200", @ANYRES64=r7, @ANYBLOB="000000000000000100000086ec17f8c5d9e5d0f98d37384935d2fc6c0e831f7c1aac3a75ee52cae83b4e7f15616a4ac84acb5c1d7151d2f12a82f9bb904ca6f688f7cca7e7640f1140547be7fd"], 0x8}, 0x1, 0x0, 0x0, 0x24000c00}, 0x0) 23:28:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1369.591304] net_ratelimit: 34 callbacks suppressed [ 1369.591310] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.601390] protocol 88fb is buggy, dev hsr_slave_1 23:28:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1370.070849] protocol 88fb is buggy, dev hsr_slave_0 [ 1370.076010] protocol 88fb is buggy, dev hsr_slave_1 23:28:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:28:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:28:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:11 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:28:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x10000, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000240)={0xfffffffffffffff8}, 0x0) clone(0x507fc00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x800000100000004) creat(0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat6\x00') sendfile(r5, r6, &(0x7f0000000040), 0xa808) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x400806e, 0x0, 0x0) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sysinfo(&(0x7f0000000300)=""/82) fstat(r8, &(0x7f00000000c0)) 23:28:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1370.409163] print_req_error: 112 callbacks suppressed [ 1370.409170] print_req_error: I/O error, dev loop0, sector 0 [ 1370.420753] buffer_io_error: 112 callbacks suppressed [ 1370.420759] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.433499] print_req_error: I/O error, dev loop0, sector 0 [ 1370.439244] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.446885] print_req_error: I/O error, dev loop0, sector 0 [ 1370.452771] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.460192] print_req_error: I/O error, dev loop0, sector 0 [ 1370.465947] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.473330] print_req_error: I/O error, dev loop0, sector 0 [ 1370.479084] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.487376] print_req_error: I/O error, dev loop0, sector 0 [ 1370.493173] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.500565] print_req_error: I/O error, dev loop0, sector 0 [ 1370.506319] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.513698] print_req_error: I/O error, dev loop0, sector 0 [ 1370.519444] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.520988] print_req_error: I/O error, dev loop0, sector 0 [ 1370.532361] Buffer I/O error on dev loop0, logical block 0, async page read [ 1370.661122] print_req_error: I/O error, dev loop0, sector 0 [ 1370.666891] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:11 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1370.720762] device bridge_slave_1 left promiscuous mode [ 1370.726475] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.787142] device bridge_slave_0 left promiscuous mode [ 1370.813533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.994262] device hsr_slave_1 left promiscuous mode [ 1371.054705] device hsr_slave_0 left promiscuous mode [ 1371.114626] team0 (unregistering): Port device team_slave_1 removed [ 1371.136306] team0 (unregistering): Port device team_slave_0 removed [ 1371.166600] bond0 (unregistering): Releasing backup interface bond_slave_1 23:28:12 executing program 2: fcntl$notify(0xffffffffffffffff, 0x402, 0x80000003) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000080)={0x0, 0x3, 0x20, 0x3, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) prctl$PR_GET_NO_NEW_PRIVS(0x27) r3 = socket(0x10, 0x2, 0x0) gettid() r4 = getpgrp(0x0) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='\x82mflIne\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r6) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x4000}) sendfile(r3, r5, 0x0, 0x1000007ffffffd) [ 1371.253145] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1371.404670] bond0 (unregistering): Released all slaves 23:28:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000600)={0x0, 0x0, 0x2080, {}, [], "a3de81c03f5316f1663aab82dc6b7853d3c504a79e4174bf435451cd6e27b35c15781e9f6795582e506a7101c223b3b0b6ed892c19fabc416dd8836efc0b900e9130ed145f00c6326f560f0a03658abce9c7bf280182e3b43f825a3a682967950fa54d0db9d5f0b118ac3df79d2889f768454a584f043925b90f733feeca248c303dfc93acaaa6e1233eaeb8bfa660d447038756a2f3dcd6e41a986d3cdf145a1d97e17f5c498ab5b08f3b212cf35405bd964a6fa0d325ae5bd317d3915b06a8442cccd1c48169377305dae490d5a5fa3bb30bf5424062f06e77884ce3b9aeeb87a8c8772bcf68bf20fc39e4ea47460838e59d61ef4de75f49caa20fa20bd12b40693f429106d42f56b97668901af4226c5224ffc1bd37b1fe1a5ac0b1f561922bcca51fbb87d749546d6fbac988e985696e4b421d0594ba581c9c3228b58657754b4d4b63e3b95b422aa55ccab1d29ed458a991750924993bbc988d5e9ba66f839d59f2cf237144da54d25289a161c45f17afa04999414016bef2d8def8c2071f14e5eee85ede67f6fbee42d9c0c0eb7ba4b3d80e1c49e52f655a2ad2ed2ab2d0a44676e9580229379babea82e10b01a1c2ffd348fda2401dfb90d30c3b2d3227f4916ae5c8247e01e4e9e8f5e3bdc3e3eaf003eab053764c88beb9b186346b9ad45bd98bf659de7c3a7ec4d964ea9b9a2098e61ed6f810d8631ee0df1f699318ef5d3c11689795b4487946aca8092e21266f4769caba9d640e8ed9d5d64c8b896674f1829e3703d9b07c2e064c3035f65cd4a30d3e3ab5aac7f15b9b3a8981a7117fe261bb757653a813a7189d330555235636a7b91f446308b1866fb732767c5518e8e48bfa8bd4e63e74f9d6ee7a348744f83344e2b5992c2240793dfd763c7eb71735a1c891ab87c0b4fc91a879f4a941ffe8a4a04b407969eb4e69cf511b68b913d9d44fb83b3e6f5d8f5ca9137990cc48f9cc0d41ab92d51314ea761ba7eecfb8a838afbaed5af32efc96329577724de16e1feddd8d7424d7b21970ee00df7d9dae919276b5fb417d5f115b7c6f222afecc68cd3ef915a8bba3eebf07327b9ff52fa88ba89f13844ad434242629635ffd0f3717f368cb1b0ba1b2514d5bedf833c9d3012ea33ef21fae7bd1873f945cb731e58fa57b61fc5fe8b537b7ddbfd3ff7375fe5ab2e4acdba2e243c26644726f30481abf40f5b8b6b3e9c9736f9466e73c7ce976feda7141a163da9fc8a154d9a61b3cf9a52ea7f06a5a681946daa6ff7f0a8d362209e6ebc863c267e588c0d41dca5c20ad48b9e86a82e91dc442f5a4e3a100e275e6d5339c2107a4a9c4f92e1cfd6e8a75d4cccef836cc2cb1d3829c6b6a11e7967ee45fb575aed632568f1851e979c579df33d126be9d52a95d6035404c87e4d87cb7fd987304eb93b3b88cbaf776c1dc0f25136b89c32b21b5981456ce9204d9a4002a9cafef60c9314fe8f2d1e9a8a430e7918501664c1abbcd45c634b518d752b411ef5f7535384cf1e2e41d4a4eb661f7a3a5e3e76c5c9a6de7ae8bc40be0f926d6c4d250d2d876a6f1d56b86d6bdd1c58bfa0b755cb1c38184d8c7ddcf07ba3b645fbc18ea9adedccfb1f7194d848cb44718eeef63063d92d778de1f16a9215cae3c9a905f751a7db43ebac038fe1364822651e46a78656a22909240afc9c0f0d2869d883f401b789c5d02e664ea276d44ebcf9784f9c2addeba16884271b448c5a4e6b000b4f5ccb5e04d20ab13b8be5d9cb3ecea55e96dc5ba197a244d39942f62ce3792fcea5c48dae097c85d4267066668c520544dc7916109b0b1004b6cb570159d3dbbeefe91e163103e96aeb8141413ca964e99e9f720a28cd702975ee328b896debe679c3c64b311428dfb2a672a5f4d7615b6ea9f737694ff49f8df57b4015f568e86993a507bc9bd2088b5cac583d9824d786bd69a601426ea421b99c01f319ebf11c190bbefbb469a23c5dd16b00a74d89212a5a3b325bc8b77ac62c2ea752ef762f4c4bc07849a78a681446374526e1f491af0293c14721caaef06646a134aaeebd49b6aab5181a48276a3bb4f11f7d3a602b5184778e43e5c690ea8c56e5f254e9b53f9f70f2d7118a4b31f0d00f7da5af54cc06e8442b4faa486c05f1ad17216be8b8f163a286d0722feb14cecfcd5f18f40eadac20dae337504276e0c6fe44e7be38ecf942585cc1965eb3c424e113e8a69fcf24ba6bc7a0e6e89c3eafceddeb13be1996805b7356884a2c50a403b1e9ddc88ec98eabe45f8c2da2f4be12acd42a496ea38700f6f0b4ae0782c810c269af009e280a26221b35179b4e4a3b49c605da88409b856d2d4a19b266b4c598d5687c4700892984f34b43c8ce642c0ca75f6c3ed01dc1e831a5246a956d1c8654aa34f801264949e7d4517b3462ae4c63bf05bb012d243e136ea11dac6c50e306fac63477a593be0e6d560d43aacd6b076b4ac3294fc71f2a381fc9729749db8251432190db94ecec6e04db06d7512580f330680a68356187dcbd8a5c99336dd384f1dd0c504e85dd9a89c398b2d174e8dec42d13ead341b7861d3bef20631912c36fa171205d9ce91be4b9c3df644ddf36bb71c9d5f5e7ad8aa2176ad3fe65aa36c555cbeb53f4c65cb53d958062b986777bc20b4f62c264b5f2ba04f9f2ef15fa3ae479b38bb7b247b607eb6e86f0ab77c53192016511a35c865434b333c9e948000345c0b4fb4b6fc5a320429b4f6c9bb3bd6b3968ec2b65e138a03fbf8ab69e96d57ec4bd4fddacf53a6ffe458629f9a1e183e33ec496842c9f13694a24f9cd65170d6fd155f7bf609427986d6cfc02b9c1e8e157c01bdfd866a48133ee9561968d2ee20731e55656b72c521d7917ce21bb6b48660cf122a559f1e8dbf2d49386f1bf2c32e461ee135ecef787f0b79a2fa6f526a865e0195f8ae315fd41a03a633bab67c099d2a2126411e1855cde5262d0a44831d7d82b1cb4b9417513929b3da3c5f51590301990a3c472055a5e533828f842bbd614b16183fd52df8bad852517f2e6329a12a72cd380f33eeaad4ed73426c2105d5e110b7a2cdc826fa74b36e9fbfdd915f88bf8b4f403811eed9761a683a1341b83958c26472404851d251a7d3c171db8685918e5f6b2dc93b4f00d3a6c7fbbbdf48bb4880270c0af352a97d9fbba054a09be2f7ad94ea3102ad445a5a282cd0e901161c748fd3132c57859ba4b02664b0b5fa896cac09ddb4df19076aae0da38e709c0fc2448e872135cb632d1a4825dd152add9bca0353fa1da5e982ee36a464302fbcfbb2fea9efb7dcea74c98d4b6c336169325a070f4bceb0d8c8b7276fad1f27b950b6bbd07be1173f3bc39351e45ecf6239c1a770606d303381bfb569d6cfda3ed4cf7efe8ef5030448946c88960ae750a36dec7b85a71a238f2c627fa203fe31c03e40c51ae0ce04854745f097932dacf59912a51a662bd00cfe1e586a0aaa36398e2793b55a2ed3d81d7a5fa6848c311a6b9ed8b0c88f725cc9ed9827e6b131ddff9a1f28defe486fde8377df5ba83aff689716c26fa6c29eb50dbb8a68002542e1d188c683ad79b76578e186e55b48219e43c9dce8925c4f3a3ee91b0fc9848d68a5b4479d4d70f4b6820a7e5ec3420fa69df026bc53e4a16107928e20de1b14306c52f0d06e15bf800395205a3972358189cd6a1a54fa788a458e096abacbb24699f065643782c7e82b45c5138b9a7f718d4d4c5dfccdf3c22363640eb36f81c780d4ba99dc4b2644edfc87b804c72e4d4e897831ef7356b31acb892c0395810241067f2cdbd5d90c3600aac32a404fd8930eab410ed8490965c372495f79410cea4bcfce40682f5e5821590315e67d5ae4cc79e8ddbe5703dadcaabd9ccc07486359b0031a0ea0c0f38fc399b4e94011ed44f3165240b490e45859ef134b07c78f918a76de45817b476d444af44f657bf2bf623c9d15b4caa7301bdea7c0bb61e7959b2e90661dc116c56eac9d28f0ba32e0044870f337f07162523aa6436a1bb19142cf39f2a042b6a72d70178cb0ff616e00352bc83dec50ec973677ae010895b625efb6f8ab9feef64403f32678bb234dd07f6ca131d48cbab661224dde0df8af8218c12ae83ce701788fec4f3a841b7bf15f825f395ce9522cb77400792cf63d41541b643ce3fe87ffea9536ef89118cd53004a38d017ce320d17d7af60ba80eefc3814a9cdc5b492242ab993ae87d4bb90002c127e5c82ef03442eab6fc5972c27cec2652c48c71e6920e3f3af3c4e900cb26aa3b033f9592c1cb742781d70825c21bd788fa817bec869c08e4196daaf7b646eb439fd3b277ee802dde8c0ea81a900f75332e2a4eb5a810c22b5939985e2ba0ec300b593dac1fde7b278ada5abf0290dfd2bb6850befb74a5ac01327300e992d8a8adfd40102e955a6d818727f1adafe22eb6ced6d2f27f994d45d1719eb74c0533ea880a050d88818f1d6f6beb1eef6057b4df0b187aa332f47cfe1f6bd6fc638cefce752157aa007fa6d70b4c607542df3df209ad6629aa8103fa6058954f94ee817207f1b9b6477c897a77f10cb2cc8cb94741f6ac6bfcec8458f56ceb91740cbf40c058d5b22c60bbbc37e5954b280615e150e7f5fc70370485d1a3b1f042d96d8f159dea2890417bfa4416dca100b67204e959bc011b4cbb8f8349339b64e1edbef3c44cffdd15cf653c78381e754a9bc12db58dd5fe88c3598790f84e67790e0ad50c5174170b8fb2ea9b783a41ad239a1cd760081f8d15cece7111434570b614c140d1467b6d3c92bde9df2e1353f01a418b047dfbd56041ea648ec363add6e6e9b579b23afa34da6da02e1e6ac649b0f7b6a336783cc1fe74b35b122750c8173145bfbd0d4da50d41efa5c99da54296fce638e35affe115d7417828b22f2f2a8a4025152bb217b91f500e8dfb34dd77b60be5e02e03a0d64bf65dade4a01873fda219f94a0ae533db0d2d1679b1f3c1b84f4425ecb07b37ae9767f48585f0680d075bf5769d2e42c626bf162c26d7f48f003320171a5308cf741a7f2e02325524bbd636f826f4c97f46ca7d37413c37e0366fe53ac5931a1e3c7bfa465a12cab262f8778bfae1351b047d1ea12b0580f1671a90ae0bcf78b3b6c2227544ecb92ddea2d430a0641df3908ce9cb3ff1320047dcd92a95dae68a7430cb72b227a292300b325c88e4085c7b7404f791d8249b91c53cde9434cc3998411b4e7520865d16941e5e02161cbd76443be4e2b819d52db9656a0f80190d2a817d724ba383a62a7b9351dc87090685f05a5769fd06fc7cbfbe6270848857d79d14c0e6bce77dc49366704c730bc16ae6bd05987f238c77464beec609049eb10a90a2688069e210f945a5938787830e0caad4c378fa157431067779978f9a5c765405ae99dfe648b67b9ca095cbfadc27e70ce749744cd026d3237c7fea366ad83f8af781fc90b6e89c46f682caffb488a3015c3b62b1a75e69af907fb3d9cdf4c0f70ebb1a1edb8faad22a05148e8f57c2d9e749d613e9dfbe21eb30e767272cf1cab9fee5f74d47baeffafb175fc392a5150e745558200509ba1fe16c9954c9db7d059cad31ed06dd476d471f67b2d282c872103d5dbd1fb3ab73d1e48dceb989ac9bf77959a67335d2a6a23d03ed5995d16265e50eaba87769b21e716d954853082d4fe6bb762ffab9964bf12986f507da0a97b39e20fa0ba2314ae7bf1d7c0d0eceafb1694b35549993d34af4437ba736e4ff7c4f1bf4544486a85fc8fb37bfd903ed023a3a895cb88e32b7", "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') pipe2(&(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 23:28:12 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1373.191358] IPVS: ftp: loaded support on port[0] = 21 [ 1373.993805] IPVS: ftp: loaded support on port[0] = 21 [ 1374.011376] chnl_net:caif_netlink_parms(): no params data found [ 1374.045919] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.052527] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.059958] device bridge_slave_0 entered promiscuous mode [ 1374.067413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.074134] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.081506] device bridge_slave_1 entered promiscuous mode [ 1374.109746] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1374.128152] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1374.156678] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1374.163859] team0: Port device team_slave_0 added [ 1374.169746] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1374.176977] team0: Port device team_slave_1 added [ 1374.182677] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1374.190320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1374.302939] device hsr_slave_0 entered promiscuous mode [ 1374.340447] device hsr_slave_1 entered promiscuous mode [ 1374.402375] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1374.416011] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1374.429108] chnl_net:caif_netlink_parms(): no params data found [ 1374.484310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.490727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1374.497430] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.503844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1374.511858] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.518214] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.525272] device bridge_slave_0 entered promiscuous mode [ 1374.532401] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.538805] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.546053] device bridge_slave_1 entered promiscuous mode [ 1374.565818] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1374.575490] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1374.600576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1374.607721] team0: Port device team_slave_0 added [ 1374.615867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1374.623192] team0: Port device team_slave_1 added [ 1374.629237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1374.637083] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1374.682425] device hsr_slave_0 entered promiscuous mode [ 1374.720395] device hsr_slave_1 entered promiscuous mode [ 1374.764588] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1374.772179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1374.791309] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.797710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1374.804342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.810712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1374.831785] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1374.837982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1374.857868] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1374.867387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1374.875491] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.882557] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.889909] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.896837] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.913000] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1374.919252] 8021q: adding VLAN 0 to HW filter on device team0 [ 1374.933625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1374.941287] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.947614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1374.961783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1374.981452] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1374.989233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1374.997021] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.003426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1375.011550] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1375.019223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1375.026867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1375.036245] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1375.049985] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1375.058116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1375.068909] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1375.075824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1375.083704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1375.091445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1375.098372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1375.111311] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1375.117406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1375.126794] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1375.133996] 8021q: adding VLAN 0 to HW filter on device team0 [ 1375.143724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1375.156031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1375.164121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1375.171814] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.178182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1375.187155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1375.201444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1375.209417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1375.217512] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.223886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1375.237931] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1375.245843] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1375.252291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1375.263337] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1375.271705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1375.279892] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1375.292159] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1375.303062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1375.309906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1375.317049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1375.325177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1375.335832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1375.346261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1375.353168] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1375.360205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1375.367849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1375.375881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1375.383725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1375.398468] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1375.407844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1375.414574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1375.427867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1375.437411] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1375.443883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1375.466181] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1375.477290] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1375.483861] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1375.491243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1375.508279] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1376.078902] device bridge_slave_1 left promiscuous mode [ 1376.093630] bridge0: port 2(bridge_slave_1) entered disabled state [ 1376.158878] device bridge_slave_0 left promiscuous mode [ 1376.167771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1376.218975] device bridge_slave_1 left promiscuous mode [ 1376.226537] bridge0: port 2(bridge_slave_1) entered disabled state [ 1376.260994] device bridge_slave_0 left promiscuous mode [ 1376.266802] bridge0: port 1(bridge_slave_0) entered disabled state [ 1376.335683] device bridge_slave_1 left promiscuous mode [ 1376.341757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1376.408469] device bridge_slave_0 left promiscuous mode [ 1376.420304] bridge0: port 1(bridge_slave_0) entered disabled state [ 1376.682556] device hsr_slave_1 left promiscuous mode [ 1376.734952] device hsr_slave_0 left promiscuous mode [ 1376.803267] team0 (unregistering): Port device team_slave_1 removed [ 1376.814467] team0 (unregistering): Port device team_slave_0 removed [ 1376.824256] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1376.863420] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1376.957367] bond0 (unregistering): Released all slaves [ 1377.064564] device hsr_slave_1 left promiscuous mode [ 1377.124557] device hsr_slave_0 left promiscuous mode [ 1377.184841] team0 (unregistering): Port device team_slave_1 removed [ 1377.195008] team0 (unregistering): Port device team_slave_0 removed [ 1377.204888] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1377.245916] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1377.315526] bond0 (unregistering): Released all slaves [ 1377.421939] device hsr_slave_1 left promiscuous mode [ 1377.462966] device hsr_slave_0 left promiscuous mode [ 1377.503241] team0 (unregistering): Port device team_slave_1 removed [ 1377.514208] team0 (unregistering): Port device team_slave_0 removed [ 1377.523732] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1377.556015] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1377.618720] bond0 (unregistering): Released all slaves 23:28:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x1c, 0x0, 0x2, 0x0, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x687b64560fc8d274}, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @local}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r1}}, 0x48) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xee00}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022002907fffffffffff900000600000014001100fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) fchmod(r2, 0x40) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) 23:28:18 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:18 executing program 2: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/528], 0x15) r2 = eventfd2(0x4, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xa000, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r3) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$P9_RLOPEN(r3, &(0x7f00000002c0)={0x18, 0xd, 0x0, {{0x0, 0x1, 0x5}, 0x7}}, 0x18) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xa0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) eventfd2(0xfffffff8, 0x1) r5 = dup3(r4, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) r6 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$VIDIOC_TRY_ENCODER_CMD(r7, 0xc028564e, &(0x7f0000000140)={0x1, 0x0, [0x4, 0x7, 0x6, 0x0, 0x0, 0x5, 0x8, 0x1]}) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) umount2(0x0, 0xb) 23:28:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:18 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1377.910169] protocol 88fb is buggy, dev hsr_slave_0 [ 1377.915341] protocol 88fb is buggy, dev hsr_slave_1 [ 1378.390493] protocol 88fb is buggy, dev hsr_slave_0 [ 1378.395660] protocol 88fb is buggy, dev hsr_slave_1 23:28:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 1378.656623] print_req_error: 112 callbacks suppressed [ 1378.656630] print_req_error: I/O error, dev loop0, sector 0 [ 1378.667801] buffer_io_error: 112 callbacks suppressed [ 1378.667808] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.680567] print_req_error: I/O error, dev loop0, sector 0 [ 1378.686359] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.693817] print_req_error: I/O error, dev loop0, sector 0 [ 1378.699602] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.707022] print_req_error: I/O error, dev loop0, sector 0 [ 1378.713390] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.721930] print_req_error: I/O error, dev loop0, sector 0 [ 1378.727721] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.738342] print_req_error: I/O error, dev loop0, sector 0 [ 1378.744458] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.751984] print_req_error: I/O error, dev loop0, sector 0 [ 1378.757747] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.765436] print_req_error: I/O error, dev loop0, sector 0 [ 1378.771245] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.780181] print_req_error: I/O error, dev loop0, sector 0 [ 1378.785952] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1378.810143] print_req_error: I/O error, dev loop0, sector 0 [ 1378.815931] Buffer I/O error on dev loop0, logical block 0, async page read [ 1378.950145] protocol 88fb is buggy, dev hsr_slave_0 [ 1378.955362] protocol 88fb is buggy, dev hsr_slave_1 23:28:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/219, 0xdb}], 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001900)={{0x100000080}, 'port1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0xee}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) gettid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x4) gettid() openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgrp(0x0) getpid() ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x0, 0x1}, {0x80}}) 23:28:20 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="56f563761508000000000000100000f90c2d000900dca311833f47c703ab1c39ad5ca9d7c0d7cc34e0841e5a54351eabcd3e7996ca2ca6f8e37eedaf39b37acf8e00dda54aaa802edb707a060f1f367c89dc980fe88484290ce3b52856df88cf0ce5b88e74cdc71dd51c97200e8abbab88ad975bd0967584747ba98898db6cbae6cff3c6e2103c47fd1cf74f88da72c87e796a06fb3f910a85f67a000000000000"], 0xa1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000000)=0xffff7fff) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) [ 1380.177643] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 1380.184992] FAT-fs (loop2): Filesystem has been set read-only [ 1380.191176] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 1380.228656] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 1382.500922] IPVS: ftp: loaded support on port[0] = 21 [ 1383.392205] IPVS: ftp: loaded support on port[0] = 21 [ 1383.402483] chnl_net:caif_netlink_parms(): no params data found [ 1383.466226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1383.472782] bridge0: port 1(bridge_slave_0) entered disabled state [ 1383.480137] device bridge_slave_0 entered promiscuous mode [ 1383.480844] IPVS: ftp: loaded support on port[0] = 21 [ 1383.492366] bridge0: port 2(bridge_slave_1) entered blocking state [ 1383.498782] bridge0: port 2(bridge_slave_1) entered disabled state [ 1383.506293] device bridge_slave_1 entered promiscuous mode [ 1383.532047] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1383.545429] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1383.588756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1383.596341] team0: Port device team_slave_0 added [ 1383.602469] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1383.609600] team0: Port device team_slave_1 added [ 1383.617322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1383.626741] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1383.688790] chnl_net:caif_netlink_parms(): no params data found [ 1383.742477] device hsr_slave_0 entered promiscuous mode [ 1383.790565] device hsr_slave_1 entered promiscuous mode [ 1383.844168] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1383.857031] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1383.942630] bridge0: port 2(bridge_slave_1) entered blocking state [ 1383.949026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1383.955700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1383.962197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1383.969859] bridge0: port 1(bridge_slave_0) entered blocking state [ 1383.976648] bridge0: port 1(bridge_slave_0) entered disabled state [ 1383.983620] device bridge_slave_0 entered promiscuous mode [ 1384.013557] bridge0: port 2(bridge_slave_1) entered blocking state [ 1384.019947] bridge0: port 2(bridge_slave_1) entered disabled state [ 1384.027419] device bridge_slave_1 entered promiscuous mode [ 1384.053134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1384.065073] chnl_net:caif_netlink_parms(): no params data found [ 1384.081661] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1384.119554] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1384.126819] team0: Port device team_slave_0 added [ 1384.143709] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1384.151630] team0: Port device team_slave_1 added [ 1384.168360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1384.181164] bridge0: port 1(bridge_slave_0) entered blocking state [ 1384.187574] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.194984] device bridge_slave_0 entered promiscuous mode [ 1384.202481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1384.208841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1384.216125] device bridge_slave_1 entered promiscuous mode [ 1384.222806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1384.282847] device hsr_slave_0 entered promiscuous mode [ 1384.320536] device hsr_slave_1 entered promiscuous mode [ 1384.371015] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1384.378320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1384.387261] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1384.399176] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.407045] bridge0: port 2(bridge_slave_1) entered disabled state [ 1384.426073] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1384.435830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1384.455275] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1384.463154] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1384.480195] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1384.487610] team0: Port device team_slave_0 added [ 1384.493647] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1384.500925] team0: Port device team_slave_1 added [ 1384.506584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1384.515401] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1384.522842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1384.529726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1384.537100] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1384.554185] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1384.563797] 8021q: adding VLAN 0 to HW filter on device team0 [ 1384.623021] device hsr_slave_0 entered promiscuous mode [ 1384.660536] device hsr_slave_1 entered promiscuous mode [ 1384.711127] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1384.723142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1384.730610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1384.738331] device bridge_slave_1 left promiscuous mode [ 1384.743981] bridge0: port 2(bridge_slave_1) entered disabled state [ 1384.780754] device bridge_slave_0 left promiscuous mode [ 1384.786385] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.932999] device hsr_slave_1 left promiscuous mode [ 1384.975841] device hsr_slave_0 left promiscuous mode [ 1385.034598] team0 (unregistering): Port device team_slave_1 removed [ 1385.044670] team0 (unregistering): Port device team_slave_0 removed [ 1385.054445] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1385.093599] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1385.164651] bond0 (unregistering): Released all slaves [ 1385.224626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1385.233317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1385.241303] bridge0: port 1(bridge_slave_0) entered blocking state [ 1385.247645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1385.262977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1385.273501] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1385.281366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1385.289106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1385.297121] bridge0: port 2(bridge_slave_1) entered blocking state [ 1385.303619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1385.318479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1385.328612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1385.339768] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1385.349126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1385.362605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1385.372754] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1385.379896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1385.388156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1385.395745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1385.403795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1385.411567] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1385.424473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1385.434865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1385.448134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1385.456291] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1385.467190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1385.475706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1385.483410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1385.490986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1385.501033] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1385.507044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1385.517342] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1385.525032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1385.532407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1385.593845] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1385.599935] 8021q: adding VLAN 0 to HW filter on device team0 [ 1385.622510] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1385.635683] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1385.645058] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1385.658625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1385.666383] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1385.678526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1385.686543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1385.699749] bridge0: port 1(bridge_slave_0) entered blocking state [ 1385.706140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1385.726830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1385.743302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1385.752532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1385.767451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1385.785976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1385.796357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1385.815215] bridge0: port 2(bridge_slave_1) entered blocking state [ 1385.821620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1385.837191] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1385.854996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1385.862948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1385.880389] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1385.889313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1385.902875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1385.915503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1385.934257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1385.948788] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1385.958719] 8021q: adding VLAN 0 to HW filter on device team0 [ 1385.969903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1385.985968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1385.996668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1386.010792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1386.027213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1386.038598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1386.046709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1386.059998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1386.074520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1386.083651] bridge0: port 1(bridge_slave_0) entered blocking state [ 1386.090091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1386.097438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1386.105740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1386.113770] bridge0: port 2(bridge_slave_1) entered blocking state [ 1386.120144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1386.127154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1386.135780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1386.145987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1386.159616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1386.169677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1386.182928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1386.193719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1386.202351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1386.213007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1386.222545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1386.231182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1386.239123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1386.247764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1386.258049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1386.278636] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1386.286216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1386.303032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1386.316545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1386.335157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1386.348719] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1386.355664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 23:28:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r2, @ANYBLOB="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"], 0x8d0}}, 0x0) [ 1386.363500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1386.377486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1386.388958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1386.405546] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1386.412368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1386.421281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1386.428714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1386.435940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1386.445444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1386.457450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1386.465503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1386.479171] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1386.490756] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1386.496853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1386.525830] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1386.546996] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1386.554680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1386.562153] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1386.575033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1387.990320] protocol 88fb is buggy, dev hsr_slave_0 [ 1387.995464] protocol 88fb is buggy, dev hsr_slave_1 [ 1388.310697] protocol 88fb is buggy, dev hsr_slave_0 [ 1388.315834] protocol 88fb is buggy, dev hsr_slave_1 23:28:29 executing program 5: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{}, {}, {}, {}, {}]}, 0x4c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 23:28:29 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:29 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000e40)='jfs\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)={[{@discard_size={'discard'}}, {@errors_remount='errors=remount-ro'}]}) 23:28:29 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000280)) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010202000270f7f8", 0x16}], 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x3, 0xb9e, &(0x7f0000000080)="4891bd", 0x0, 0x3}) umount2(&(0x7f0000000140)='./file0\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r4 = add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a0500000000000000422cb4963a160161b1cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73", 0xbc, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r4, r5}, &(0x7f0000000240)=""/112, 0x70, &(0x7f0000000580)={&(0x7f0000000040)={'sha256-generic\x00'}}) keyctl$assume_authority(0x10, r5) 23:28:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1388.779211] FAT-fs (loop5): Directory bread(block 513) failed [ 1388.790389] protocol 88fb is buggy, dev hsr_slave_0 [ 1388.795554] protocol 88fb is buggy, dev hsr_slave_1 [ 1388.800750] protocol 88fb is buggy, dev hsr_slave_0 [ 1388.805155] FAT-fs (loop5): Directory bread(block 514) failed [ 1388.805841] protocol 88fb is buggy, dev hsr_slave_1 [ 1388.817930] FAT-fs (loop5): Directory bread(block 515) failed 23:28:30 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) close(0xffffffffffffffff) 23:28:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r7, 0xffffffffffffffff) r8 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r8, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1388.899444] FAT-fs (loop5): Directory bread(block 516) failed [ 1389.030116] protocol 88fb is buggy, dev hsr_slave_0 [ 1389.032857] FAT-fs (loop5): Directory bread(block 517) failed [ 1389.035409] protocol 88fb is buggy, dev hsr_slave_1 [ 1389.066493] FAT-fs (loop5): Directory bread(block 518) failed 23:28:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) add_key(&(0x7f00000010c0)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmctl$IPC_RMID(0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-vsock\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1, 0x100000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) init_module(0x0, 0x0, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket(0x0, 0x3, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000340)=@fragment={0x21, 0x0, 0x81, 0x1, 0x0, 0x0, 0x68}, 0x8) [ 1389.079192] FAT-fs (loop5): Directory bread(block 519) failed [ 1389.095110] FAT-fs (loop5): Directory bread(block 520) failed [ 1389.107507] FAT-fs (loop5): Directory bread(block 521) failed [ 1389.114423] FAT-fs (loop5): Directory bread(block 522) failed 23:28:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) add_key(&(0x7f00000010c0)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmctl$IPC_RMID(0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-vsock\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1, 0x100000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) init_module(0x0, 0x0, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) r2 = socket(0x0, 0x3, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000340)=@fragment={0x21, 0x0, 0x81, 0x1, 0x0, 0x0, 0x68}, 0x8) 23:28:30 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x3a) recvmsg(r1, &(0x7f000000b000)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) 23:28:30 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x10001}, 0x1c) 23:28:30 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000280)) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010202000270f7f8", 0x16}], 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x3, 0xb9e, &(0x7f0000000080)="4891bd", 0x0, 0x3}) umount2(&(0x7f0000000140)='./file0\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r4 = add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a0500000000000000422cb4963a160161b1cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73", 0xbc, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r5, r4, r5}, &(0x7f0000000240)=""/112, 0x70, &(0x7f0000000580)={&(0x7f0000000040)={'sha256-generic\x00'}}) keyctl$assume_authority(0x10, r5) [ 1389.637331] print_req_error: 112 callbacks suppressed [ 1389.637337] print_req_error: I/O error, dev loop0, sector 0 [ 1389.648938] buffer_io_error: 112 callbacks suppressed [ 1389.648944] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1389.678932] print_req_error: I/O error, dev loop0, sector 0 [ 1389.684943] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.697080] print_req_error: I/O error, dev loop0, sector 0 [ 1389.703024] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.713765] print_req_error: I/O error, dev loop0, sector 0 [ 1389.719555] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.727219] print_req_error: I/O error, dev loop0, sector 0 [ 1389.733086] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.741012] print_req_error: I/O error, dev loop0, sector 0 [ 1389.746860] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.754592] print_req_error: I/O error, dev loop0, sector 0 [ 1389.760377] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.767653] print_req_error: I/O error, dev loop0, sector 0 23:28:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {0x4}, [], {}, [{0x8, 0x0, 0xee00}]}, 0x2c, 0x0) dup3(r0, r1, 0x0) [ 1389.773466] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.781287] device bridge_slave_1 left promiscuous mode [ 1389.789452] print_req_error: I/O error, dev loop0, sector 0 [ 1389.790412] bridge0: port 2(bridge_slave_1) entered disabled state [ 1389.795267] Buffer I/O error on dev loop0, logical block 0, async page read [ 1389.809949] print_req_error: I/O error, dev loop0, sector 0 [ 1389.815755] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) [ 1389.852844] device bridge_slave_0 left promiscuous mode [ 1389.858462] bridge0: port 1(bridge_slave_0) entered disabled state [ 1389.902633] [ 1389.904743] ============================= [ 1389.905561] FAT-fs (loop5): Directory bread(block 513) failed [ 1389.908885] WARNING: suspicious RCU usage [ 1389.918969] 4.14.154 #0 Not tainted [ 1389.922598] ----------------------------- [ 1389.926750] include/linux/radix-tree.h:238 suspicious rcu_dereference_check() usage! [ 1389.929390] FAT-fs (loop5): Directory bread(block 514) failed [ 1389.934646] [ 1389.934646] other info that might help us debug this: [ 1389.934646] [ 1389.934656] [ 1389.934656] rcu_scheduler_active = 2, debug_locks = 1 [ 1389.934662] 2 locks held by syz-executor.2/19820: [ 1389.934665] #0: (&sb->s_type->i_mutex_key#12){+.+.}, at: [] shmem_add_seals+0x15e/0x1060 [ 1389.934699] #1: (&(&mapping->tree_lock)->rlock){-.-.}, at: [] shmem_add_seals+0x334/0x1060 [ 1389.934721] [ 1389.934721] stack backtrace: [ 1389.934730] CPU: 1 PID: 19820 Comm: syz-executor.2 Not tainted 4.14.154 #0 [ 1389.934737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.934740] Call Trace: [ 1389.934757] dump_stack+0x142/0x197 [ 1389.934768] ? vprintk_func+0x65/0x159 [ 1389.934782] lockdep_rcu_suspicious+0x153/0x15d [ 1389.934794] shmem_add_seals+0x9e0/0x1060 [ 1389.934811] ? shmem_put_link+0xe0/0xe0 [ 1389.934829] shmem_fcntl+0xf7/0x130 [ 1389.934840] do_fcntl+0x190/0xe10 [ 1389.934849] ? f_getown+0xb0/0xb0 [ 1389.934861] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1389.934871] ? selinux_file_fcntl+0x66/0x110 [ 1389.934884] ? security_file_fcntl+0x89/0xb0 [ 1389.958581] FAT-fs (loop5): Directory bread(block 515) failed [ 1389.960405] SyS_fcntl+0xd5/0x110 [ 1389.960414] ? do_fcntl+0xe10/0xe10 [ 1389.960427] do_syscall_64+0x1e8/0x640 [ 1389.960435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1389.960452] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1389.960460] RIP: 0033:0x45a639 [ 1389.960465] RSP: 002b:00007f39e00b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1389.960474] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 1389.960479] RDX: 0000000000000008 RSI: 0000000000000409 RDI: 0000000000000005 [ 1389.960484] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1389.960489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f39e00b26d4 [ 1389.960495] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff [ 1390.158588] FAT-fs (loop5): Directory bread(block 516) failed [ 1390.178342] FAT-fs (loop5): Directory bread(block 517) failed [ 1390.197510] FAT-fs (loop5): Directory bread(block 518) failed [ 1390.206996] FAT-fs (loop5): Directory bread(block 519) failed [ 1390.219454] FAT-fs (loop5): Directory bread(block 520) failed [ 1390.228583] device hsr_slave_1 left promiscuous mode [ 1390.238649] FAT-fs (loop5): Directory bread(block 521) failed [ 1390.245068] FAT-fs (loop5): Directory bread(block 522) failed 23:28:31 executing program 5: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480), 0x24, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480), 0x24, 0x0) [ 1390.284062] device hsr_slave_0 left promiscuous mode [ 1390.344291] team0 (unregistering): Port device team_slave_1 removed [ 1390.388685] team0 (unregistering): Port device team_slave_0 removed [ 1390.429764] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1390.484598] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1390.624700] bond0 (unregistering): Released all slaves [ 1392.400917] IPVS: ftp: loaded support on port[0] = 21 [ 1393.195270] IPVS: ftp: loaded support on port[0] = 21 [ 1393.267863] chnl_net:caif_netlink_parms(): no params data found [ 1393.317501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.324531] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.331627] device bridge_slave_0 entered promiscuous mode [ 1393.339343] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.346130] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.353216] device bridge_slave_1 entered promiscuous mode [ 1393.406339] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1393.435201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1393.465860] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1393.473166] team0: Port device team_slave_0 added [ 1393.478401] chnl_net:caif_netlink_parms(): no params data found [ 1393.487358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1393.494917] team0: Port device team_slave_1 added [ 1393.503736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1393.520647] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1393.594126] device hsr_slave_0 entered promiscuous mode [ 1393.630566] device hsr_slave_1 entered promiscuous mode [ 1393.681022] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1393.695177] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1393.711978] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.718395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.725798] device bridge_slave_0 entered promiscuous mode [ 1393.733137] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.739536] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.747333] device bridge_slave_1 entered promiscuous mode [ 1393.775392] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1393.785362] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1393.806702] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.813115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1393.819871] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.826275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1393.842767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1393.850231] team0: Port device team_slave_0 added [ 1393.856956] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1393.865408] team0: Port device team_slave_1 added [ 1393.882450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1393.894623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1393.917371] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1393.923680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1393.962831] device hsr_slave_0 entered promiscuous mode [ 1394.010385] device hsr_slave_1 entered promiscuous mode [ 1394.050994] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1394.064933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1394.072274] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1394.083490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1394.091018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.097836] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.111664] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1394.117832] 8021q: adding VLAN 0 to HW filter on device team0 [ 1394.129188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1394.137226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.143783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.164478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1394.172594] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.179046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1394.186649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1394.195101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1394.207710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1394.216349] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1394.235062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1394.242975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1394.251278] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1394.272393] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1394.279615] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1394.291865] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1394.298623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1394.306043] device bridge_slave_1 left promiscuous mode [ 1394.313069] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.341322] device bridge_slave_0 left promiscuous mode [ 1394.346947] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.485266] device hsr_slave_1 left promiscuous mode [ 1394.553145] device hsr_slave_0 left promiscuous mode [ 1394.593379] team0 (unregistering): Port device team_slave_1 removed [ 1394.605425] team0 (unregistering): Port device team_slave_0 removed [ 1394.615491] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1394.645622] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1394.735809] bond0 (unregistering): Released all slaves [ 1394.776867] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1394.804866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1394.814474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1394.824454] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1394.831017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1394.838238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1394.848217] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1394.854642] 8021q: adding VLAN 0 to HW filter on device team0 [ 1394.868400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1394.876809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1394.887504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1394.895545] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.902081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.909210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1394.921458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1394.956332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1394.975837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1394.985283] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.991709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1395.007081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1395.017232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1395.033016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1395.049019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1395.066135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1395.075842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1395.088329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1395.100901] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1395.115979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1395.123948] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1395.136955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1395.145001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1395.158173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1395.166074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1395.239440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1395.251870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1395.271884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1395.303449] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1395.312367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1395.374070] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1395.386197] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1395.394739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1395.406120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1395.424680] 8021q: adding VLAN 0 to HW filter on device batadv0 23:28:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002740)={0x14, 0x42, 0xa01}, 0x14}}, 0x0) recvmsg$kcm(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x2}, 0x0) 23:28:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 23:28:37 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000280)) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010202000270f7f8", 0x16}], 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x3, 0xb9e, &(0x7f0000000080)="4891bd", 0x0, 0x3}) umount2(&(0x7f0000000140)='./file0\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) keyctl$assume_authority(0x10, 0x0) 23:28:37 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:37 executing program 2: 23:28:37 executing program 5: [ 1396.037545] FAT-fs (loop4): Directory bread(block 513) failed [ 1396.047527] FAT-fs (loop4): Directory bread(block 514) failed [ 1396.063840] FAT-fs (loop4): Directory bread(block 515) failed 23:28:37 executing program 5: 23:28:37 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) [ 1396.084545] FAT-fs (loop4): Directory bread(block 516) failed [ 1396.099342] FAT-fs (loop4): Directory bread(block 517) failed [ 1396.145916] FAT-fs (loop4): Directory bread(block 518) failed [ 1396.212456] FAT-fs (loop4): Directory bread(block 519) failed 23:28:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) [ 1396.275258] FAT-fs (loop4): Directory bread(block 520) failed [ 1396.290768] FAT-fs (loop4): Directory bread(block 521) failed [ 1396.297100] FAT-fs (loop4): Directory bread(block 522) failed [ 1396.310442] net_ratelimit: 6 callbacks suppressed [ 1396.310446] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.320432] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.742643] print_req_error: 112 callbacks suppressed [ 1396.742649] print_req_error: I/O error, dev loop0, sector 0 [ 1396.753922] buffer_io_error: 112 callbacks suppressed [ 1396.753929] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.767157] print_req_error: I/O error, dev loop0, sector 0 [ 1396.772961] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.782622] print_req_error: I/O error, dev loop0, sector 0 [ 1396.788470] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.796850] print_req_error: I/O error, dev loop0, sector 0 [ 1396.802735] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.809996] print_req_error: I/O error, dev loop0, sector 0 [ 1396.815834] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.823174] print_req_error: I/O error, dev loop0, sector 0 [ 1396.828895] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.836261] print_req_error: I/O error, dev loop0, sector 0 [ 1396.842047] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.849317] print_req_error: I/O error, dev loop0, sector 0 [ 1396.855121] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.862531] print_req_error: I/O error, dev loop0, sector 0 [ 1396.868275] Buffer I/O error on dev loop0, logical block 0, async page read [ 1396.885003] print_req_error: I/O error, dev loop0, sector 0 [ 1396.890853] Buffer I/O error on dev loop0, logical block 0, async page read 23:28:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) 23:28:38 executing program 5: 23:28:38 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:38 executing program 4: 23:28:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:38 executing program 5: 23:28:38 executing program 4: 23:28:38 executing program 5: 23:28:38 executing program 4: 23:28:38 executing program 5: 23:28:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:38 executing program 2: 23:28:38 executing program 4: 23:28:38 executing program 5: [ 1397.670114] protocol 88fb is buggy, dev hsr_slave_0 [ 1397.675300] protocol 88fb is buggy, dev hsr_slave_1 [ 1397.830098] protocol 88fb is buggy, dev hsr_slave_0 [ 1397.835249] protocol 88fb is buggy, dev hsr_slave_1 23:28:39 executing program 2: 23:28:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff905f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a95978cf0fa0f4515e45acf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4681140744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fda31a52255432f3e116927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:39 executing program 4: 23:28:39 executing program 5: 23:28:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) getpeername$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:39 executing program 2: 23:28:39 executing program 5: 23:28:39 executing program 2: 23:28:39 executing program 4: 23:28:39 executing program 5: [ 1398.304116] device bridge_slave_1 left promiscuous mode [ 1398.312908] bridge0: port 2(bridge_slave_1) entered disabled state 23:28:39 executing program 2: [ 1398.383394] device bridge_slave_0 left promiscuous mode [ 1398.400149] protocol 88fb is buggy, dev hsr_slave_0 [ 1398.405303] protocol 88fb is buggy, dev hsr_slave_1 [ 1398.439198] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.715462] device hsr_slave_1 left promiscuous mode [ 1398.775418] device hsr_slave_0 left promiscuous mode [ 1398.835373] team0 (unregistering): Port device team_slave_1 removed [ 1398.859853] team0 (unregistering): Port device team_slave_0 removed [ 1398.888294] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1398.935049] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1399.053491] bond0 (unregistering): Released all slaves 23:28:40 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x208100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x97, "88f9e26f8f18a1db79ab29d7f124ae88d57f2556bc8ffe71fbf35be70142253c", 0x366d7a6f3152fb4f, 0x10, 0x1ff, 0x5, 0x8, 0x0, 0x4, 0x9}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/4, &(0x7f0000000140)=0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r3, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x7, 0x7ff, 0xfff}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r8, 0x1000000) sendfile(r7, r8, &(0x7f00000000c0)=0xf18001, 0xeefffdef) fcntl$setflags(r7, 0x2, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000004c0)={0x800, {{0xa, 0x4e22, 0x40, @ipv4={[], [], @broadcast}, 0x800}}, {{0xa, 0x4e20, 0xe79e, @mcast2, 0x8}}}, 0x108) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 23:28:40 executing program 4: 23:28:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4, 0x400}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10000}, 0x0, 0xeffffffffffffffd, r5, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup3(0xffffffffffffffff, r3, 0x0) getpeername$netrom(r9, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:28:40 executing program 5: 23:28:40 executing program 2: [ 1399.750163] protocol 88fb is buggy, dev hsr_slave_0 [ 1399.755325] protocol 88fb is buggy, dev hsr_slave_1