[info] Using makefile-style concurrent boot in runlevel 2. [ 44.453314][ T26] audit: type=1800 audit(1573898371.471:21): pid=7467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 44.501489][ T26] audit: type=1800 audit(1573898371.471:22): pid=7467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.25' (ECDSA) to the list of known hosts. 2019/11/16 09:59:42 fuzzer started 2019/11/16 09:59:44 dialing manager at 10.128.0.105:34521 2019/11/16 09:59:44 syscalls: 2566 2019/11/16 09:59:44 code coverage: enabled 2019/11/16 09:59:44 comparison tracing: enabled 2019/11/16 09:59:44 extra coverage: extra coverage is not supported by the kernel 2019/11/16 09:59:44 setuid sandbox: enabled 2019/11/16 09:59:44 namespace sandbox: enabled 2019/11/16 09:59:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/16 09:59:44 fault injection: enabled 2019/11/16 09:59:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/16 09:59:44 net packet injection: enabled 2019/11/16 09:59:44 net device setup: enabled 2019/11/16 09:59:44 concurrency sanitizer: enabled 2019/11/16 09:59:44 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 63.527702][ T7634] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/16 09:59:57 adding functions to KCSAN blacklist: 'find_get_pages_range_tag' 'do_syslog' 'timer_clear_idle' '__perf_event_overflow' 'tick_nohz_next_event' 'pid_update_inode' 'kcm_ioctl' 'n_tty_receive_buf_common' '__rb_insert_augmented' '__mark_inode_dirty' 'common_perm_cond' 'audit_log_start' 'taskstats_exit' 'vm_area_dup' 'snd_seq_check_queue' 'futex_wait_queue_me' 'ext4_has_free_clusters' 'echo_char' 'ext4_ext_insert_extent' 'rcu_gp_fqs_loop' 'pipe_poll' 'ep_poll' 'generic_fillattr' 'do_exit' 'l2tp_tunnel_del_work' 'xas_clear_mark' 'rcu_gp_fqs_check_wake' 'ext4_free_inode' 'blk_mq_sched_dispatch_requests' 'atime_needs_update' 'list_lru_count_one' 'run_timer_softirq' 'copy_process' '__dev_queue_xmit' 'ext4_free_inodes_count' 'do_wait' 'poll_schedule_timeout' '__rb_erase_color' '__process_echoes' '__blk_queue_split' 'kvm_mmu_notifier_invalidate_range_end' 'pipe_wait' 'generic_write_end' 'sctp_assoc_migrate' 'lruvec_lru_size' 'inode_permission' 'wbt_done' 'fprop_fraction_percpu' 'find_next_bit' 'p9_poll_workfn' 'kauditd_thread' 'tcp_add_backlog' 'tomoyo_supervisor' 'mod_timer' '__hrtimer_run_queues' 'dd_has_work' 'tick_do_update_jiffies64' 'blk_mq_get_request' 'ext4_nonda_switch' 'add_timer' 'pcpu_alloc' 'ext4_mark_iloc_dirty' '__get_user_pages' '__put_unused_fd' '__ext4_new_inode' 'xas_find_marked' 'ext4_da_write_end' 'filemap_map_pages' '__snd_rawmidi_transmit_ack' 'tick_sched_do_timer' 'blk_mq_dispatch_rq_list' 'blk_mq_run_hw_queue' 'ktime_get_real_seconds' 'page_counter_try_charge' 'do_nanosleep' 'tick_nohz_idle_stop_tick' 10:03:09 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) 10:03:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffd65, 0x0, 0x0, 0xfffffffffffffe29) [ 263.170046][ T7638] IPVS: ftp: loaded support on port[0] = 21 [ 263.241257][ T7640] IPVS: ftp: loaded support on port[0] = 21 [ 263.308405][ T7638] chnl_net:caif_netlink_parms(): no params data found [ 263.350321][ T7638] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.361482][ T7638] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.369352][ T7638] device bridge_slave_0 entered promiscuous mode [ 263.384104][ T7638] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.391251][ T7638] bridge0: port 2(bridge_slave_1) entered disabled state 10:03:10 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup(r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) [ 263.400146][ T7638] device bridge_slave_1 entered promiscuous mode [ 263.447102][ T7638] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.462547][ T7640] chnl_net:caif_netlink_parms(): no params data found [ 263.476996][ T7638] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.517045][ T7638] team0: Port device team_slave_0 added [ 263.523266][ T7640] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.530371][ T7640] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.539778][ T7640] device bridge_slave_0 entered promiscuous mode [ 263.547874][ T7638] team0: Port device team_slave_1 added [ 263.556120][ T7640] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.563437][ T7640] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.571361][ T7640] device bridge_slave_1 entered promiscuous mode 10:03:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xe0}}}, 0xb8}}, 0x0) [ 263.703596][ T7638] device hsr_slave_0 entered promiscuous mode [ 263.752812][ T7638] device hsr_slave_1 entered promiscuous mode [ 263.793079][ T7644] IPVS: ftp: loaded support on port[0] = 21 [ 263.835619][ T7640] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.872938][ T7640] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.949491][ T7640] team0: Port device team_slave_0 added [ 263.982454][ T7640] team0: Port device team_slave_1 added [ 263.989211][ T7638] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.996364][ T7638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.999923][ T7646] IPVS: ftp: loaded support on port[0] = 21 [ 264.003828][ T7638] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.016724][ T7638] bridge0: port 1(bridge_slave_0) entered forwarding state 10:03:11 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 264.184728][ T7640] device hsr_slave_0 entered promiscuous mode [ 264.222563][ T7640] device hsr_slave_1 entered promiscuous mode [ 264.251748][ T7640] debugfs: Directory 'hsr0' with parent '/' already present! [ 264.386754][ T7638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.465477][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.488268][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.563081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 264.669642][ T7644] chnl_net:caif_netlink_parms(): no params data found [ 264.739574][ T7638] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.841605][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.849665][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.902012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.910845][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.991721][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.998807][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.061964][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.070731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.152019][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.159130][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.268909][ T7695] IPVS: ftp: loaded support on port[0] = 21 [ 265.271485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.313077][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.363591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.412068][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.462096][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.511934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 10:03:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0xc0101282, 0x0) [ 265.563997][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.602537][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.649756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 265.782767][ T7644] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.790041][ T7644] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.883024][ T7644] device bridge_slave_0 entered promiscuous mode [ 265.925649][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.941958][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.978948][ T7638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.003983][ T7644] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.011055][ T7644] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.064067][ T7644] device bridge_slave_1 entered promiscuous mode [ 266.147605][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.157501][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.206464][ T7638] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.227484][ T7640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.248346][ T7646] chnl_net:caif_netlink_parms(): no params data found [ 266.285178][ T7644] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.296760][ T7706] IPVS: ftp: loaded support on port[0] = 21 [ 266.332769][ T7644] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.425074][ T7644] team0: Port device team_slave_0 added [ 266.443478][ T7646] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.450595][ T7646] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.485922][ T7646] device bridge_slave_0 entered promiscuous mode [ 266.504484][ T7646] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.518457][ T7646] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.539610][ T7646] device bridge_slave_1 entered promiscuous mode [ 266.550109][ T7640] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.562841][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.572304][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.589554][ T7644] team0: Port device team_slave_1 added [ 266.647622][ T7646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.658898][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.667861][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.676425][ T7667] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.683665][ T7667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.773475][ T7644] device hsr_slave_0 entered promiscuous mode [ 266.811815][ T7644] device hsr_slave_1 entered promiscuous mode [ 266.851515][ T7644] debugfs: Directory 'hsr0' with parent '/' already present! [ 266.859991][ T7646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.869249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.877458][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.886144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.895451][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.902708][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.910912][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.920194][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.929089][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.937774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.946565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.955375][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.964260][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.972904][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.985550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.995717][ T7695] chnl_net:caif_netlink_parms(): no params data found [ 267.026847][ T7640] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.040513][ T7640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.052228][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.061254][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.066216][ T7725] mmap: syz-executor.0 (7725) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 267.103995][ T7695] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.111137][ T7695] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.119960][ T7695] device bridge_slave_0 entered promiscuous mode [ 267.128368][ T7646] team0: Port device team_slave_0 added [ 267.141098][ C0] hrtimer: interrupt took 35568 ns [ 267.158241][ T7640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.167487][ T7695] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.175491][ T7695] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.199167][ T7695] device bridge_slave_1 entered promiscuous mode [ 267.219263][ T7646] team0: Port device team_slave_1 added [ 267.247724][ T7728] 9pnet: Insufficient options for proto=fd [ 267.257687][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.265686][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.350255][ T7695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.374720][ T7747] 9pnet: Insufficient options for proto=fd [ 267.453089][ T7695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.488620][ T7706] chnl_net:caif_netlink_parms(): no params data found 10:03:14 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 267.563942][ T7646] device hsr_slave_0 entered promiscuous mode [ 267.642023][ T7646] device hsr_slave_1 entered promiscuous mode [ 267.674052][ T7646] debugfs: Directory 'hsr0' with parent '/' already present! [ 267.710402][ T7695] team0: Port device team_slave_0 added [ 267.735530][ T7695] team0: Port device team_slave_1 added 10:03:15 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 268.077364][ T7695] device hsr_slave_0 entered promiscuous mode 10:03:15 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 268.142112][ T7695] device hsr_slave_1 entered promiscuous mode [ 268.171469][ T7695] debugfs: Directory 'hsr0' with parent '/' already present! [ 268.566989][ T7644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.632403][ T7706] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.639485][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.687637][ T7706] device bridge_slave_0 entered promiscuous mode [ 268.745606][ T7706] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.824377][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.885165][ T7706] device bridge_slave_1 entered promiscuous mode 10:03:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffd65, 0x0, 0x0, 0xfffffffffffffe29) [ 269.286180][ T7644] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.518555][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.561858][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.849009][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.875268][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.950211][ T7722] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.957411][ T7722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.082900][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.147975][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.228128][ T7722] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.235240][ T7722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.344584][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.405160][ T7706] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.481246][ T7646] 8021q: adding VLAN 0 to HW filter on device bond0 10:03:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffd65, 0x0, 0x0, 0xfffffffffffffe29) [ 270.779928][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.804834][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.869733][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.930338][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.987334][ T7706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.072173][ T7646] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.242802][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.250983][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.314884][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.373590][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.415019][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.510824][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.548371][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.579970][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.622111][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.650267][ T7644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.805935][ T7695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.830185][ T7644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.852870][ T7706] team0: Port device team_slave_0 added [ 271.930134][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.947928][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.964063][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.971270][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.982225][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.999771][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.008727][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.015816][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.026777][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.035969][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.048644][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.057817][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.070245][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:03:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffd65, 0x0, 0x0, 0xfffffffffffffe29) [ 272.079204][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.091236][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.099061][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.112809][ T7706] team0: Port device team_slave_1 added [ 272.150861][ T7646] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 272.161746][ T7646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.173607][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.192655][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 10:03:19 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 272.200980][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.209881][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.219054][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.228455][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.293817][ T7706] device hsr_slave_0 entered promiscuous mode [ 272.312318][ T7706] device hsr_slave_1 entered promiscuous mode [ 272.351633][ T7706] debugfs: Directory 'hsr0' with parent '/' already present! [ 272.387685][ T7851] 9pnet: Insufficient options for proto=fd [ 272.418107][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.429506][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.437407][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.453581][ T7695] 8021q: adding VLAN 0 to HW filter on device team0 10:03:19 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 272.469326][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.489910][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.516029][ T7646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.526466][ T7854] fuse: Bad value for 'fd' [ 272.532335][ T28] device bridge_slave_1 left promiscuous mode [ 272.538614][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.573921][ T7854] 9pnet: Insufficient options for proto=fd [ 272.602102][ T28] device bridge_slave_0 left promiscuous mode [ 272.608356][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.451756][ T28] device hsr_slave_0 left promiscuous mode [ 273.491669][ T28] device hsr_slave_1 left promiscuous mode [ 273.547223][ T28] team0 (unregistering): Port device team_slave_1 removed [ 273.557760][ T28] team0 (unregistering): Port device team_slave_0 removed [ 273.568124][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 273.606922][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 273.659529][ T28] bond0 (unregistering): Released all slaves 10:03:20 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup(r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) [ 274.088467][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.112345][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.120731][ T7676] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.127801][ T7676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.184988][ T7865] IPVS: ftp: loaded support on port[0] = 21 [ 274.193307][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.201284][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.252067][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.260463][ T7676] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.267616][ T7676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.302290][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.324885][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.394319][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.413099][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.442224][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.451213][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.482486][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.502217][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.521944][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.542209][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.562316][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.586469][ T7695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.656126][ T7706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.737836][ T7706] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.772935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.784425][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.816759][ T7695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 274.853038][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 10:03:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xe0}}}, 0xb8}}, 0x0) [ 274.860578][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 274.913781][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.949275][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.996405][ T2938] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.003597][ T2938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.069191][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.120037][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.148361][ T2938] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.155585][ T2938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.232288][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.252256][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.276285][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.295670][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.315531][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.332909][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.343004][ T7676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.376824][ T7706] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 275.391892][ T7706] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 275.417454][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.429939][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.445527][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.454749][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.466368][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.498737][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.514064][ T7865] chnl_net:caif_netlink_parms(): no params data found [ 275.530121][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.538046][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.550824][ T7706] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.616485][ T7865] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.636621][ T7865] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.646644][ T7865] device bridge_slave_0 entered promiscuous mode [ 275.658995][ T7865] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.667375][ T7865] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.679471][ T7865] device bridge_slave_1 entered promiscuous mode [ 275.706763][ T7865] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.717439][ T7919] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 275.719811][ T7865] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.756890][ T7865] team0: Port device team_slave_0 added [ 275.777155][ T7865] team0: Port device team_slave_1 added [ 275.843756][ T7865] device hsr_slave_0 entered promiscuous mode [ 275.891738][ T7865] device hsr_slave_1 entered promiscuous mode [ 275.950031][ T7865] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.957577][ T7865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.964927][ T7865] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.972090][ T7865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.012399][ T7865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.025913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.035585][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.054648][ T5] bridge0: port 2(bridge_slave_1) entered disabled state 10:03:23 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:03:23 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) 10:03:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xe0}}}, 0xb8}}, 0x0) 10:03:23 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup(r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) [ 276.068725][ T7865] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.083657][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.092475][ T2938] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.099557][ T2938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.238829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.265726][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.273727][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.468607][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.496039][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.656051][ T7865] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 276.670521][ T7865] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 276.686622][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.698824][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.725374][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.745063][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.765057][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.782493][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.791050][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.822120][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.841676][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.849854][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.906647][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.914292][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.930077][ T7865] 8021q: adding VLAN 0 to HW filter on device batadv0 10:03:24 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:03:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0xc0101282, 0x0) 10:03:24 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup(r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) 10:03:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xe0}}}, 0xb8}}, 0x0) [ 277.180943][ T7953] 9pnet: Insufficient options for proto=fd 10:03:24 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:03:24 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 277.345867][ T28] device bridge_slave_1 left promiscuous mode [ 277.367095][ T28] bridge0: port 2(bridge_slave_1) entered disabled state 10:03:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0xc0101282, 0x0) 10:03:24 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 277.425582][ T28] device bridge_slave_0 left promiscuous mode [ 277.440433][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 10:03:24 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 277.540864][ T7974] fuse: Bad value for 'fd' [ 277.668239][ T7983] fuse: Bad value for 'fd' [ 277.676819][ T7974] 9pnet: Insufficient options for proto=fd [ 277.814801][ T7983] 9pnet: Insufficient options for proto=fd [ 278.591680][ T28] device hsr_slave_0 left promiscuous mode [ 278.631605][ T28] device hsr_slave_1 left promiscuous mode [ 278.698138][ T28] team0 (unregistering): Port device team_slave_1 removed [ 278.708596][ T28] team0 (unregistering): Port device team_slave_0 removed [ 278.719016][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 278.775130][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 278.862543][ T28] bond0 (unregistering): Released all slaves [ 279.166540][ T7991] IPVS: ftp: loaded support on port[0] = 21 [ 279.231140][ T7991] chnl_net:caif_netlink_parms(): no params data found [ 279.302287][ T7991] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.309384][ T7991] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.319674][ T7991] device bridge_slave_0 entered promiscuous mode [ 279.328037][ T7991] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.337724][ T7991] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.347142][ T7991] device bridge_slave_1 entered promiscuous mode [ 279.367957][ T7991] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.381340][ T7991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.403275][ T7991] team0: Port device team_slave_0 added [ 279.410040][ T7991] team0: Port device team_slave_1 added [ 279.464389][ T7991] device hsr_slave_0 entered promiscuous mode [ 279.511692][ T7991] device hsr_slave_1 entered promiscuous mode [ 279.591462][ T7991] debugfs: Directory 'hsr0' with parent '/' already present! [ 279.610221][ T7991] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.617466][ T7991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.624795][ T7991] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.631860][ T7991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.674209][ T7991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.687066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.695747][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.704237][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.716429][ T7991] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.726964][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.735610][ T2938] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.742895][ T2938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.763469][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.772535][ T7722] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.779678][ T7722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.788359][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.797205][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.806075][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.820713][ T7991] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.831722][ T7991] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.845221][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.854149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.863157][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.884907][ T7991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.893104][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.900559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 10:03:27 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 280.134563][ T8004] 9pnet: Insufficient options for proto=fd 10:03:27 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:03:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0xc0101282, 0x0) 10:03:27 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x60000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:03:27 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) 10:03:27 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) [ 280.293631][ T8014] fuse: Bad value for 'fd' 10:03:27 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) open(&(0x7f0000000400)='./file0\x00', 0x200, 0x84) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x40, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x19) pipe(&(0x7f0000000140)) pipe(0x0) syz_open_procfs(0x0, 0x0) fadvise64(0xffffffffffffffff, 0x9, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x400) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) [ 280.356181][ T8014] 9pnet: Insufficient options for proto=fd 10:03:27 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07f02a0000000100ff0704000000450001070300001419001a00120002000b000100030025", 0x2f}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x64734a2e, 0x20000) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x403a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000340)='.\x00', 0x46f, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="72db68d4f14316513139cacf4914d407c96a15182b958020cc21c9aae51b7ea08f90fe0117cc7cee317c8a0dca5cf70a5cee5a7774fef93baa203c0754a432c6115b9bbbd1442ef745db918f96", 0x4d, 0x80}, {&(0x7f0000000580)="aa0160b370c3be37a62ca824ea60e4584f35a576ee81563aacb2c03a09d475f1c9c006f4875fe97dbb9482c5c40d809ced39064103896774238e624f3da7ade19f20e27f85868c94985de39713ffa431e2974907529e78f95bfabd2404ba55301650a0a08651eb991fadd139c990d7be63968315e88ffaf5498b323947f1535f53cb03085554b1581a2683b529e6ee2d2315153d0d7553e932b8b6921b71b9796d", 0xa1, 0x1}, {&(0x7f0000000640)="471674eaf5411649e67fa73db98075e4034f4ae0e7ec5e569348025ae71ec9c35a74b0079bbdad517b6944bc434ec242af8d0f20220afaff0c95cda39a714997e3e8dd3f839cef8d5773b99ae3f5fb43994097682594a6898c001e0f65612a5a358b3e41c86a26466bf0524c7a", 0x6d, 0x1}], 0x19840, &(0x7f0000000740)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x91, 0x39, 0x37, 0x31, 0x30, 0x65], 0x2d, [0x36, 0x63, 0x34a1f28e07fa1a75, 0x58], 0x2d, [0x39, 0x35, 0x33, 0x37], 0x2d, [0x36, 0x35, 0x9db704ae4e4b5f78, 0x63], 0x2d, [0x54537839ddbaedd3, 0x33, 0x30, 0x64, 0x38, 0x32, 0x32, 0x63]}}}, {@smackfsdef={'smackfsdef'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='dno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000008000,\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c72666e6f3d00225ff5aebc5706864d8dfd9dfe294fba770903a506ea", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000000000,\x00']) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0xc) r6 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0x80984120, &(0x7f0000001f64)) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000007c0)) ioctl$VIDIOC_S_TUNER(r6, 0x4054561e, &(0x7f0000000440)={0x2, "cade8e022cd5de342bcfb3f2ae01e02e879621a5caa4aea35655e495cd159ee7", 0x2, 0x118, 0x81, 0xfffffffc, 0x10, 0x2, 0x800000, 0x6}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000001c0)=0xc) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, 0x0}, 0x10) openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) 10:03:27 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) open(&(0x7f0000000400)='./file0\x00', 0x200, 0x84) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x40, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x19) pipe(&(0x7f0000000140)) pipe(0x0) syz_open_procfs(0x0, 0x0) fadvise64(0xffffffffffffffff, 0x9, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x400) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 10:03:27 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) open(&(0x7f0000000400)='./file0\x00', 0x200, 0x84) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x40, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x19) pipe(&(0x7f0000000140)) pipe(0x0) syz_open_procfs(0x0, 0x0) fadvise64(0xffffffffffffffff, 0x9, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x400) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 10:03:27 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) open(&(0x7f0000000400)='./file0\x00', 0x200, 0x84) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x40, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x19) pipe(&(0x7f0000000140)) pipe(0x0) syz_open_procfs(0x0, 0x0) fadvise64(0xffffffffffffffff, 0x9, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x400) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 10:03:27 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) open(&(0x7f0000000400)='./file0\x00', 0x200, 0x84) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x40, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, 0xffffffffffffffff, 0x19) pipe(&(0x7f0000000140)) pipe(0x0) syz_open_procfs(0x0, 0x0) fadvise64(0xffffffffffffffff, 0x9, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x400) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r3) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) [ 282.112586][ T28] device bridge_slave_1 left promiscuous mode [ 282.118976][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.152317][ T28] device bridge_slave_0 left promiscuous mode [ 282.158585][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.222681][ T28] device bridge_slave_1 left promiscuous mode [ 282.229037][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.272224][ T28] device bridge_slave_0 left promiscuous mode [ 282.278537][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.181861][ C0] ================================================================== [ 283.190015][ C0] BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish [ 283.198587][ C0] [ 283.201001][ C0] read to 0xffff8880b389a150 of 8 bytes by interrupt on cpu 1: [ 283.208528][ C0] br_handle_frame_finish+0x7b1/0xa90 [ 283.213890][ C0] br_nf_hook_thresh+0x1f8/0x210 [ 283.218837][ C0] br_nf_pre_routing_finish_ipv6+0x3cb/0x520 [ 283.224809][ C0] br_nf_pre_routing_ipv6+0x23a/0x340 [ 283.230166][ C0] br_nf_pre_routing+0xaf8/0xd75 [ 283.235094][ C0] br_handle_frame+0x432/0x890 [ 283.239884][ C0] __netif_receive_skb_core+0xb8f/0x1a90 [ 283.245645][ C0] __netif_receive_skb_one_core+0x67/0xe0 [ 283.251384][ C0] __netif_receive_skb+0x37/0xf0 [ 283.256313][ C0] process_backlog+0x207/0x4b0 [ 283.261071][ C0] net_rx_action+0x3ae/0xa90 [ 283.265644][ C0] __do_softirq+0x115/0x33f [ 283.270144][ C0] run_ksoftirqd+0x46/0x60 [ 283.274557][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 283.279478][ C0] kthread+0x1d4/0x200 [ 283.283535][ C0] ret_from_fork+0x1f/0x30 [ 283.287936][ C0] [ 283.290250][ C0] write to 0xffff8880b389a150 of 8 bytes by interrupt on cpu 0: [ 283.297865][ C0] br_handle_frame_finish+0x7c4/0xa90 [ 283.303231][ C0] br_nf_hook_thresh+0x1f8/0x210 [ 283.308163][ C0] br_nf_pre_routing_finish_ipv6+0x3cb/0x520 [ 283.314128][ C0] br_nf_pre_routing_ipv6+0x23a/0x340 [ 283.319497][ C0] br_nf_pre_routing+0xaf8/0xd75 [ 283.324415][ C0] br_handle_frame+0x432/0x890 [ 283.329159][ C0] __netif_receive_skb_core+0xb8f/0x1a90 [ 283.334777][ C0] __netif_receive_skb_one_core+0x67/0xe0 [ 283.340473][ C0] __netif_receive_skb+0x37/0xf0 [ 283.345391][ C0] process_backlog+0x207/0x4b0 [ 283.350131][ C0] net_rx_action+0x3ae/0xa90 [ 283.354713][ C0] __do_softirq+0x115/0x33f [ 283.359216][ C0] run_ksoftirqd+0x46/0x60 [ 283.363610][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 283.368525][ C0] kthread+0x1d4/0x200 [ 283.372670][ C0] ret_from_fork+0x1f/0x30 [ 283.377069][ C0] [ 283.379376][ C0] Reported by Kernel Concurrency Sanitizer on: [ 283.385526][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-rc7+ #0 [ 283.392831][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.402967][ C0] ================================================================== [ 283.411006][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 283.417674][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-rc7+ #0 [ 283.425207][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.435440][ C0] Call Trace: [ 283.438721][ C0] dump_stack+0x11d/0x181 [ 283.443071][ C0] panic+0x210/0x640 [ 283.446962][ C0] ? vprintk_func+0x8d/0x140 [ 283.451553][ C0] kcsan_report.cold+0xc/0xd [ 283.456135][ C0] kcsan_setup_watchpoint+0x3fe/0x460 [ 283.461505][ C0] __tsan_unaligned_write8+0xc4/0x100 [ 283.466861][ C0] br_handle_frame_finish+0x7c4/0xa90 [ 283.472233][ C0] ? nf_hook_slow+0xb8/0x160 [ 283.476829][ C0] br_nf_hook_thresh+0x1f8/0x210 [ 283.481850][ C0] ? br_pass_frame_up+0x300/0x300 [ 283.486858][ C0] ? br_pass_frame_up+0x300/0x300 [ 283.491875][ C0] br_nf_pre_routing_finish_ipv6+0x3cb/0x520 [ 283.497859][ C0] ? br_pass_frame_up+0x300/0x300 [ 283.502870][ C0] br_nf_pre_routing_ipv6+0x23a/0x340 [ 283.508234][ C0] ? __read_once_size.constprop.0+0x20/0x20 [ 283.514204][ C0] br_nf_pre_routing+0xaf8/0xd75 [ 283.519139][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.525381][ C0] br_handle_frame+0x432/0x890 [ 283.530125][ C0] ? br_nf_pre_routing_finish+0x810/0x810 [ 283.535824][ C0] ? br_pass_frame_up+0x300/0x300 [ 283.540859][ C0] ? br_handle_frame_finish+0xa90/0xa90 [ 283.546390][ C0] __netif_receive_skb_core+0xb8f/0x1a90 [ 283.552021][ C0] ? ip6_rcv_finish+0x11d/0x140 [ 283.556887][ C0] ? br_handle_frame_finish+0xa90/0xa90 [ 283.563995][ C0] __netif_receive_skb_one_core+0x67/0xe0 [ 283.569696][ C0] __netif_receive_skb+0x37/0xf0 [ 283.574624][ C0] process_backlog+0x207/0x4b0 [ 283.579397][ C0] net_rx_action+0x3ae/0xa90 [ 283.583975][ C0] __do_softirq+0x115/0x33f [ 283.588462][ C0] ? takeover_tasklets+0x250/0x250 [ 283.593560][ C0] run_ksoftirqd+0x46/0x60 [ 283.597962][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 283.602885][ C0] kthread+0x1d4/0x200 [ 283.606934][ C0] ? constant_test_bit.constprop.0+0x30/0x30 [ 283.612913][ C0] ? kthread_stop+0x2d0/0x2d0 [ 283.617581][ C0] ret_from_fork+0x1f/0x30 [ 283.623506][ C0] Kernel Offset: disabled [ 283.627954][ C0] Rebooting in 86400 seconds..