v6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 808.132702][T16687] 8021q: adding VLAN 0 to HW filter on device team0 [ 808.144553][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 808.152903][ T3686] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.160208][ T3686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 808.184841][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 808.193754][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.201052][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 808.228400][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 808.240074][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 808.310917][T16690] chnl_net:caif_netlink_parms(): no params data found [ 808.336990][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 808.353418][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 808.426177][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 808.435661][T16687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 808.460999][T16690] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.468489][T16690] bridge0: port 1(bridge_slave_0) entered disabled state [ 808.477259][T16690] device bridge_slave_0 entered promiscuous mode [ 808.551398][T16690] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.559064][T16690] bridge0: port 2(bridge_slave_1) entered disabled state [ 808.567341][T16690] device bridge_slave_1 entered promiscuous mode [ 808.587722][T16690] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 808.658289][T16690] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 808.670684][T16687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 808.692527][T16690] team0: Port device team_slave_0 added [ 808.701433][T16690] team0: Port device team_slave_1 added 08:53:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x5000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000500dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:42 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x3f00000000000000) 08:53:42 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x3f00000000000000) [ 808.786692][T16694] EXT4-fs (sda1): re-mounted. Opts: (null) 08:53:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x6000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 808.859217][T16690] device hsr_slave_0 entered promiscuous mode [ 808.874829][T16702] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 808.947921][T16690] device hsr_slave_1 entered promiscuous mode 08:53:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000600dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x7000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 809.089602][T16716] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:42 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x4000000000000000) 08:53:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000700dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x10000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 809.272768][T16729] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 809.637304][ T3042] device bridge_slave_1 left promiscuous mode [ 809.643496][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.676256][ T3042] device bridge_slave_0 left promiscuous mode [ 809.682577][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 811.357020][ T3042] device hsr_slave_1 left promiscuous mode [ 811.409910][ T3042] device hsr_slave_0 left promiscuous mode [ 811.470798][ T3042] team0 (unregistering): Port device team_slave_1 removed [ 811.483689][ T3042] team0 (unregistering): Port device team_slave_0 removed [ 811.497100][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 811.521048][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 811.602216][ T3042] bond0 (unregistering): Released all slaves [ 811.767366][T16690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 811.781667][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 811.791233][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 811.801906][T16690] 8021q: adding VLAN 0 to HW filter on device team0 [ 811.812011][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 811.812425][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 811.829155][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.836354][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 811.864373][T16690] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 811.876406][T16690] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 811.888611][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 811.897283][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 811.906329][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 811.914765][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.922004][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 811.930236][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 811.939761][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 811.948430][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 811.957628][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 811.966300][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 811.974857][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 811.984094][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 811.992459][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 812.001185][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 812.009651][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 812.018105][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 812.026053][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 812.093612][T16690] 8021q: adding VLAN 0 to HW filter on device batadv0 08:53:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x300, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:45 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000800dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:45 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x4000000000000000) 08:53:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:45 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x8dffffff00000000) 08:53:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 812.371135][T16759] EXT4-fs (sda1): re-mounted. Opts: (null) [ 812.383035][T16760] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 812.413357][T16765] EXT4-fs (sda1): re-mounted. Opts: (null) 08:53:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000900dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x3f000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 812.649248][T16770] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:46 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x8dffffff00000000) 08:53:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000a00dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x40000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 812.917461][T16782] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:46 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0xe000000000000000) 08:53:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x500, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:46 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0xe000000000000000) 08:53:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000b00dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x600, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 813.496538][T16805] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x48000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 814.910143][T16821] IPVS: ftp: loaded support on port[0] = 21 [ 814.969174][T16821] chnl_net:caif_netlink_parms(): no params data found [ 815.216590][T16821] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.223713][T16821] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.231476][T16821] device bridge_slave_0 entered promiscuous mode [ 815.239576][T16821] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.247157][T16821] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.255053][T16821] device bridge_slave_1 entered promiscuous mode [ 815.272928][T16821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 815.399042][T16821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 815.573959][T16821] team0: Port device team_slave_0 added [ 815.585951][T16824] IPVS: ftp: loaded support on port[0] = 21 [ 815.587142][T16821] team0: Port device team_slave_1 added [ 815.658115][T16821] device hsr_slave_0 entered promiscuous mode [ 815.696507][T16821] device hsr_slave_1 entered promiscuous mode [ 815.919444][T16821] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.926942][T16821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 815.935784][T16821] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.942989][T16821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.087954][T16824] chnl_net:caif_netlink_parms(): no params data found [ 816.097643][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.106623][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.273321][T16824] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.280554][T16824] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.288728][T16824] device bridge_slave_0 entered promiscuous mode [ 816.298890][T16821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 816.306942][T16824] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.314197][T16824] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.322500][T16824] device bridge_slave_1 entered promiscuous mode [ 816.461414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 816.470248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 816.480519][T16824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 816.491999][T16821] 8021q: adding VLAN 0 to HW filter on device team0 [ 816.622239][T16824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 816.642991][T16824] team0: Port device team_slave_0 added [ 816.651402][T16824] team0: Port device team_slave_1 added [ 816.662531][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 816.671668][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 816.680515][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.687624][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.818119][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 816.827664][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 816.836617][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.843665][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 816.917811][T16824] device hsr_slave_0 entered promiscuous mode [ 816.965475][T16824] device hsr_slave_1 entered promiscuous mode [ 817.015575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 817.037105][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 817.046291][ T3042] device bridge_slave_1 left promiscuous mode [ 817.052451][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.086148][ T3042] device bridge_slave_0 left promiscuous mode [ 817.092471][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.150292][ T3042] device bridge_slave_1 left promiscuous mode [ 817.156737][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.206271][ T3042] device bridge_slave_0 left promiscuous mode [ 817.212448][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.487928][ T3042] device hsr_slave_1 left promiscuous mode [ 820.530190][ T3042] device hsr_slave_0 left promiscuous mode [ 820.588451][ T3042] team0 (unregistering): Port device team_slave_1 removed [ 820.599905][ T3042] team0 (unregistering): Port device team_slave_0 removed [ 820.612542][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 820.651627][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 820.746233][ T3042] bond0 (unregistering): Released all slaves [ 820.908242][ T3042] device hsr_slave_1 left promiscuous mode [ 820.970335][ T3042] device hsr_slave_0 left promiscuous mode [ 821.018411][ T3042] team0 (unregistering): Port device team_slave_1 removed [ 821.029757][ T3042] team0 (unregistering): Port device team_slave_0 removed [ 821.042140][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 821.101349][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 821.201555][ T3042] bond0 (unregistering): Released all slaves [ 821.334582][T16821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 821.350377][T16821] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 821.369275][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 821.378520][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 821.387316][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 821.396196][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 821.405173][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 821.413559][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 821.422388][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 821.430847][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 821.455426][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 821.463209][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 821.477620][T16821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 821.498550][T16824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 821.525332][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 821.533223][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 821.543855][T16824] 8021q: adding VLAN 0 to HW filter on device team0 [ 821.560873][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 821.570349][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 821.579058][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.586613][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 821.594550][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 821.619983][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 821.620390][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 821.637469][ T3686] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.644536][ T3686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 821.654771][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 821.668000][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 821.689529][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 821.699870][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 821.708587][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 821.717704][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 821.726655][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 08:53:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000d00dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:55 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0xf0ffffff00000000) 08:53:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x4c000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:55 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0xf0ffffff00000000) [ 821.734936][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 821.743245][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 821.751964][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 821.760261][T16833] EXT4-fs (sda1): re-mounted. Opts: (null) [ 821.762539][T16824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 821.779513][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 08:53:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x60000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 821.844573][T16835] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000e00dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 821.941947][T16824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 822.031278][T16852] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x68000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c001000dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:55 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0xffffffff00000000) [ 822.293763][T16863] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x700, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x6c000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000000)=0x3, 0x4) accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r3, 0x0, r0, 0x0, 0x20000000000, 0xb) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') write$P9_RFSYNC(r2, &(0x7f0000000240)={0x7, 0x33, 0x1}, 0x7) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, r5, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd48f}]}, 0x50}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) 08:53:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c001200dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:56 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000000)={0xfff, 0x1, 0xfff, @random="a78b6ff28ac4", 'veth1_to_bond\x00'}) ioctl$RTC_UIE_OFF(r0, 0x7004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="7365697479001f00000000000004000000000000000000000000f7ff000e000000040000007803000000000000180200000000000000000000f8000002e0020000e0020000e00200e3df020000e002000004000000bd43de97388b886d75b1cb48aaab4761e82918468b80bb3e4832e19925e6ede9021e7cf299cbd804003f5d2ecea59ebe4e9926a2e770f17c502e30bdab5ebad36a0f1d951f7c5f7942000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x3d8) [ 822.941970][T16886] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x74000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c001400dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="bb88214a9ddd529d56f4edab73bd949979bd04e1708db344c35ed3b2f30465c52266ebd99a3b524b8f7bde2c179412cc22ad7779342cbbf9ddaf84d1103fc80473ca90ce6b2c805a26d5cd3080c5e3e8a9ec27093acc517d4dc7a4ec1ff7f68310bd35c0e5b2c98e9711ce927ee125cc086aed5f22f7b27db6d635f8da592b67e6df8490ff71e13e3de6a5feb1488ecd1867e138cff497bd6043122bab5fb405492239a4d4669fbc56002fbae9d772ea704e9aedbb2710754ecf", 0xba) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="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") setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f00000002c0), 0x4) getpeername$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c) [ 823.235683][T16907] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:56 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0x4, 0x80000000}) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:53:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x7a000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:53:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c002300dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 823.524923][T16921] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:53:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xa00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:53:57 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x27bd154f93a0a8d0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:53:57 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c002600dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:53:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x8cffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 823.894164][T16932] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 825.394493][T16950] IPVS: ftp: loaded support on port[0] = 21 [ 825.576817][T16950] chnl_net:caif_netlink_parms(): no params data found [ 825.718642][T16950] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.726225][T16950] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.733938][T16950] device bridge_slave_0 entered promiscuous mode [ 825.742669][T16950] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.750047][T16950] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.758132][T16950] device bridge_slave_1 entered promiscuous mode [ 825.890394][T16950] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 825.900694][T16950] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 825.917301][T16950] team0: Port device team_slave_0 added [ 825.924253][T16950] team0: Port device team_slave_1 added [ 826.107720][T16950] device hsr_slave_0 entered promiscuous mode [ 826.155390][T16950] device hsr_slave_1 entered promiscuous mode [ 826.348763][T16950] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.355874][T16950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.363401][T16950] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.370518][T16950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.517224][T16950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 826.534305][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 826.543035][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.551024][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.560120][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 826.686918][T16950] 8021q: adding VLAN 0 to HW filter on device team0 [ 826.697747][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 826.707086][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 826.715509][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.722702][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.849888][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.858827][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.867983][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.875179][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.885945][ T3042] device bridge_slave_1 left promiscuous mode [ 826.892112][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.956194][ T3042] device bridge_slave_0 left promiscuous mode [ 826.962467][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.997115][ T3042] device bridge_slave_1 left promiscuous mode [ 827.003291][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.046314][ T3042] device bridge_slave_0 left promiscuous mode [ 827.052600][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.276976][ T3042] device hsr_slave_1 left promiscuous mode [ 830.320192][ T3042] device hsr_slave_0 left promiscuous mode [ 830.390636][ T3042] team0 (unregistering): Port device team_slave_1 removed [ 830.402089][ T3042] team0 (unregistering): Port device team_slave_0 removed [ 830.414186][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.473085][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 830.571777][ T3042] bond0 (unregistering): Released all slaves [ 830.728330][ T3042] device hsr_slave_1 left promiscuous mode [ 830.790370][ T3042] device hsr_slave_0 left promiscuous mode [ 830.849967][ T3042] team0 (unregistering): Port device team_slave_1 removed [ 830.861399][ T3042] team0 (unregistering): Port device team_slave_0 removed [ 830.873371][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.932486][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 831.017761][ T3042] bond0 (unregistering): Released all slaves [ 831.149316][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 831.165942][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 831.174712][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 831.183696][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 831.192725][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 831.201222][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 831.209929][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 831.218809][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 831.227677][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 831.241284][T16950] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 831.253387][T16950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 831.261529][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 831.271024][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 831.299166][T16950] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:04 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c006000dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xc0000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x2000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:04 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x5) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)={0x900}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:04 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) move_pages(r3, 0xa, &(0x7f0000000080)=[&(0x7f0000552000/0x4000)=nil, &(0x7f0000554000/0x2000)=nil, &(0x7f0000555000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000551000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000551000/0x3000)=nil], 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x2) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 831.401331][T16956] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xc0ed0000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:05 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c006d00dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf5ffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 831.698191][T16976] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:05 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000000)={'bpq0\x00', 0x7}) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) 08:54:05 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c006e00dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf6ffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 832.000406][T16992] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:06 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00dc00dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf8f73f00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:06 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x4, 0x0, 0x3, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000240)={r1, 0xcc}, 0x8) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x2f3b0000, 0x100, 0xe4, 0x6}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={r5, 0x6, 0x800}, 0x8) r6 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r6, 0x0, 0x20000000003, 0x0) [ 832.681088][T17009] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 834.044324][T17023] IPVS: ftp: loaded support on port[0] = 21 [ 834.157599][T17023] chnl_net:caif_netlink_parms(): no params data found [ 834.242653][T17023] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.250042][T17023] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.258164][T17023] device bridge_slave_0 entered promiscuous mode [ 834.321152][T17023] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.328587][T17023] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.339311][T17023] device bridge_slave_1 entered promiscuous mode [ 834.411033][T17023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 834.423570][T17023] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 834.497079][T17023] team0: Port device team_slave_0 added [ 834.503737][T17023] team0: Port device team_slave_1 added [ 834.557870][T17023] device hsr_slave_0 entered promiscuous mode [ 834.625547][T17023] device hsr_slave_1 entered promiscuous mode [ 834.748675][T17023] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.756060][T17023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 834.764005][T17023] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.771357][T17023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 834.802797][T17023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 834.817666][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 834.825929][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.833637][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.842467][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 834.909039][T17023] 8021q: adding VLAN 0 to HW filter on device team0 [ 834.922485][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 834.931420][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.938900][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 835.016666][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 835.025439][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 835.033471][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 835.041781][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 835.050737][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 835.061071][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 835.069171][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 835.078307][ T3042] device bridge_slave_1 left promiscuous mode [ 835.084776][ T3042] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.135849][ T3042] device bridge_slave_0 left promiscuous mode [ 835.142195][ T3042] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.806937][ T3042] device hsr_slave_1 left promiscuous mode [ 836.860452][ T3042] device hsr_slave_0 left promiscuous mode [ 836.908367][ T3042] team0 (unregistering): Port device team_slave_1 removed [ 836.921521][ T3042] team0 (unregistering): Port device team_slave_0 removed [ 836.933211][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 836.981052][ T3042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 837.070392][ T3042] bond0 (unregistering): Released all slaves [ 837.200637][T17023] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 837.212858][T17023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 837.221510][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 837.243065][T17023] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x3f00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:10 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) fchdir(r1) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xff0f0000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000003dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:10 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$uinput_user_dev(r1, &(0x7f0000000340)={'syz0\x00', {0x401, 0x6, 0x8001}, 0x37, [0x3ff, 0xffffffffffffffff, 0x3, 0x1a, 0x7, 0x47b8, 0x5, 0x3, 0x8, 0x2, 0x1000, 0x7, 0x2ba, 0xe16, 0x60000000000000, 0x8000, 0x2c, 0x3, 0x80000001, 0x8, 0x53f0, 0x6, 0x3f, 0x175f, 0x8, 0xfff, 0x4, 0x7, 0x7, 0xffffffff, 0xffffffff80000001, 0x10001, 0x0, 0x0, 0x12, 0x5, 0x100000001, 0x20, 0xa1, 0x0, 0xfffffffffffffffa, 0x4, 0x8, 0xf, 0x9, 0x4, 0x4, 0x1, 0x539c52ae, 0x4, 0x3, 0x800, 0x3ff, 0x1f, 0x7896ae1c, 0x8cb1, 0x5, 0x9, 0x4, 0x5, 0xffffffffffff1b6b, 0x0, 0xffff, 0x4], [0xffffffffffffff81, 0x4, 0x1, 0x4, 0x7, 0x4, 0x7fffffff, 0x1, 0x8, 0x8, 0x100000000, 0x8, 0xffffffffffffea07, 0x9, 0x0, 0x6, 0x8, 0x7, 0x6, 0x152cedc4, 0x7, 0x33, 0x2, 0x6, 0x1f, 0x400, 0xfffffffffffffff7, 0x6, 0x6, 0x6, 0x80, 0x8, 0xfffffffffffff800, 0x5, 0x6, 0x101, 0x2, 0x8001, 0x3, 0x5, 0xffffffffffffffc0, 0x5, 0x3179, 0x6, 0x1, 0x5, 0x12, 0x5ab, 0x1, 0x6, 0x40, 0x0, 0x5551, 0x1, 0x80000000, 0x8, 0x100, 0x8, 0x0, 0x5, 0x2, 0x80000001, 0x7ff], [0x8, 0xff, 0x80000000, 0x4, 0x101, 0x1, 0x101, 0x4, 0x3, 0x5, 0x34b, 0xff, 0xff, 0x1, 0x8b06, 0x8, 0xfffffffffffffffc, 0xff, 0x6, 0x7, 0x7, 0x4, 0x1, 0x8001, 0x1, 0x4, 0x800, 0x101, 0x100000001, 0x8001, 0x7f, 0x5, 0x1, 0xffffffffffffffff, 0x0, 0xf6, 0x0, 0x1, 0x1e700, 0xe34, 0xffffffff00000001, 0xff, 0x9, 0x8, 0xffffffff83db8489, 0x6, 0x10001, 0x59, 0x800, 0x3, 0x1, 0xffffffff, 0x2, 0x0, 0x8, 0xfffffffffffffff8, 0x0, 0xa0, 0x2, 0x90b, 0x400, 0x20, 0x1], [0x1, 0x40, 0xff, 0x100, 0xdfd4, 0x8, 0x8001, 0x3183, 0x9, 0x1, 0x0, 0x25, 0x2, 0x0, 0x2, 0x400, 0x0, 0xfffffffffffffffa, 0x1, 0x1, 0x509, 0x9, 0xa56, 0x7fffffff, 0x1, 0x9, 0x133, 0x7, 0x10000, 0x80000000, 0x9, 0xff, 0x1, 0x1, 0xe852, 0x2, 0x0, 0xe094, 0x9, 0x4, 0x9, 0x80000001, 0xffff, 0x9, 0xff, 0x7, 0x2, 0x7, 0xdad, 0x7986, 0x1, 0x200, 0x7fff, 0x0, 0x5, 0x1, 0x1b3e, 0x986d, 0xffffffffffffffff, 0x0, 0x3, 0xfff, 0x9, 0x1]}, 0x45c) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000000)) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:54:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xfffff000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c002804dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 837.623854][T17048] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xffffff8c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c002904dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 837.883746][T17059] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xfffffff5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003004dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 838.180535][T17068] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:12 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000080)={r4, 0xbd15}, &(0x7f00000000c0)=0x8) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0xd14aa4f2958b48c8) r5 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r5, 0x0, 0x20000000003, 0x0) [ 839.762413][T17088] IPVS: ftp: loaded support on port[0] = 21 [ 839.874499][T17088] chnl_net:caif_netlink_parms(): no params data found [ 839.962597][T17088] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.970023][T17088] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.977674][T17088] device bridge_slave_0 entered promiscuous mode [ 839.985564][T17088] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.992694][T17088] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.000865][T17088] device bridge_slave_1 entered promiscuous mode [ 840.071833][T17088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 840.082767][T17088] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 840.155864][T17088] team0: Port device team_slave_0 added [ 840.162576][T17088] team0: Port device team_slave_1 added [ 840.238163][T17088] device hsr_slave_0 entered promiscuous mode [ 840.295648][T17088] device hsr_slave_1 entered promiscuous mode [ 840.417030][T17088] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.424361][T17088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 840.431740][T17088] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.439220][T17088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 840.536104][T17088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 840.549748][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 840.558865][ T7933] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.568470][ T7933] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.578154][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 840.647213][T17088] 8021q: adding VLAN 0 to HW filter on device team0 [ 840.658414][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 840.666920][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.674405][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 840.684702][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 840.693605][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.700726][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 840.709795][ T8970] device bridge_slave_1 left promiscuous mode [ 840.716106][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.765950][ T8970] device bridge_slave_0 left promiscuous mode [ 840.772368][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.417312][ T8970] device hsr_slave_1 left promiscuous mode [ 842.458632][ T8970] device hsr_slave_0 left promiscuous mode [ 842.510969][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 842.524210][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 842.535713][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 842.570747][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 842.660472][ T8970] bond0 (unregistering): Released all slaves [ 842.817925][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 842.828778][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 842.837696][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 842.853192][T17088] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 842.864206][T17088] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 842.876531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 842.886515][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 842.895121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 842.903531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 842.912170][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 842.920873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 842.929763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 842.948004][T17088] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:16 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xfffffff6, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003104dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4800, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:16 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) prctl$PR_GET_CHILD_SUBREAPER(0x25) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000000)={{0x0, 0x8}, 'port1\x00', 0x25, 0x20000, 0xfffffffffffffff7, 0x0, 0x8, 0xcce0, 0x1, 0x0, 0x2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x11) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 843.027684][T17092] EXT4-fs (sda1): re-mounted. Opts: (null) [ 843.119300][T17096] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xedc000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003204dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 843.304496][T17110] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x1000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:17 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003304dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x4000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 843.688436][T17124] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:17 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x4) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:17 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003404dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 844.230682][T17140] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:17 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x72521d63cccf940d, './file0\x00'}, 0x6e) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x6040, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000040)=0x18, 0x4) msgget(0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) fsync(r0) 08:54:17 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0xff, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES64=r0], 0xef14726bd821456f) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 845.701423][T17163] IPVS: ftp: loaded support on port[0] = 21 [ 845.814293][T17163] chnl_net:caif_netlink_parms(): no params data found [ 845.844756][T17163] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.852155][T17163] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.860224][T17163] device bridge_slave_0 entered promiscuous mode [ 845.924690][T17163] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.932734][T17163] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.940713][T17163] device bridge_slave_1 entered promiscuous mode [ 846.012619][T17163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 846.023776][T17163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 846.042057][T17163] team0: Port device team_slave_0 added [ 846.049346][T17163] team0: Port device team_slave_1 added [ 846.156869][T17163] device hsr_slave_0 entered promiscuous mode [ 846.205625][T17163] device hsr_slave_1 entered promiscuous mode [ 846.330344][T17163] bridge0: port 2(bridge_slave_1) entered blocking state [ 846.337933][T17163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 846.345728][T17163] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.353075][T17163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 846.442669][T17163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 846.454353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 846.462657][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.470770][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.479267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 846.553347][T17163] 8021q: adding VLAN 0 to HW filter on device team0 [ 846.564033][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 846.572844][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.580239][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 846.590668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 846.599662][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 846.607082][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 846.616228][ T8970] device bridge_slave_1 left promiscuous mode [ 846.622449][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.676278][ T8970] device bridge_slave_0 left promiscuous mode [ 846.682797][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.287980][ T8970] device hsr_slave_1 left promiscuous mode [ 848.360830][ T8970] device hsr_slave_0 left promiscuous mode [ 848.429905][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 848.441640][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 848.453141][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 848.491415][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 848.591174][ T8970] bond0 (unregistering): Released all slaves [ 848.689533][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 848.700308][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 848.716531][T17163] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 848.727471][T17163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 848.739529][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 848.749698][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 848.758410][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 848.767601][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 848.776873][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 848.785690][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 848.797579][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 848.817137][T17163] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4c00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x8000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:22 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003504dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:22 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x363) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:22 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000000)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 848.985381][T17171] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x10000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:22 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003604dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf0ffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 849.298799][T17190] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf83f0000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:23 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000000)=0x5, 0x4) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0x341) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:54:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003704dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x100000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 849.928254][T17211] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:23 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRESOCT=r1, @ANYRESDEC=r1, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB="71ee3ae03902d3a97816a25d0962ef83422e31954068b776a7af6eaf47d3e886b45c49c4a1cd768cd771593a0344722375ba29eff823b835dfb6aabac366f6e042d9c3fd1242d3a0ce6c25b0951dc7f6a12fd436ee2701256b8993d023e3dc0b35d91be0eabe6b6773d7748e1595befd6eb4bb3649cdc1d74f1ca62c4e6277641a0b2be9b76b72", @ANYRES64=r0, @ANYRES32=r1, @ANYRES32], @ANYRESDEC=r1, @ANYRESDEC=r0], 0xfffffffffffffe1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x87) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000340)) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 851.417880][T17232] IPVS: ftp: loaded support on port[0] = 21 [ 851.474914][T17232] chnl_net:caif_netlink_parms(): no params data found [ 851.559712][T17232] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.567200][T17232] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.574796][T17232] device bridge_slave_0 entered promiscuous mode [ 851.582992][T17232] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.590335][T17232] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.598170][T17232] device bridge_slave_1 entered promiscuous mode [ 851.670009][T17232] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 851.680942][T17232] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 851.697139][T17232] team0: Port device team_slave_0 added [ 851.704749][T17232] team0: Port device team_slave_1 added [ 851.817500][T17232] device hsr_slave_0 entered promiscuous mode [ 851.855444][T17232] device hsr_slave_1 entered promiscuous mode [ 851.961601][T17232] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.969557][T17232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 851.988234][T17232] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.995828][T17232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.086573][T17232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.098402][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 852.107086][ T7933] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.115011][ T7933] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.124808][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 852.193251][T17232] 8021q: adding VLAN 0 to HW filter on device team0 [ 852.205051][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 852.213464][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.220556][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.296383][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 852.306277][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.313322][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.321852][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 852.393630][T17232] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 852.405428][T17232] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 852.417807][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 852.427726][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 852.436210][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 852.444470][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 852.453143][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 852.461590][ T8970] device bridge_slave_1 left promiscuous mode [ 852.469685][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.536096][ T8970] device bridge_slave_0 left promiscuous mode [ 852.542281][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.197029][ T8970] device hsr_slave_1 left promiscuous mode [ 854.250151][ T8970] device hsr_slave_0 left promiscuous mode [ 854.309825][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 854.321342][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 854.332931][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 854.371204][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 854.481686][ T8970] bond0 (unregistering): Released all slaves [ 854.611500][T17232] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:28 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003804dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6800, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:28 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$void(r1, 0xc0045c79) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x200000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:28 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x14) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 854.760778][T17238] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:28 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000340)) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x30) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022abd7000fbdbdf25010000000000000007410000004c0018000000067564700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x4048001}, 0x24040040) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0xfffffffffffffed9) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:54:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x300000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:28 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c003904dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:28 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{0x6, 0xfff, 0x200, 0x2}, 'syz1\x00', 0x24}) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 855.101235][T17265] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:28 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000005dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x400000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:29 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000006dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 857.226274][T17297] IPVS: ftp: loaded support on port[0] = 21 [ 857.339564][T17297] chnl_net:caif_netlink_parms(): no params data found [ 857.374586][T17297] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.382606][T17297] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.390390][T17297] device bridge_slave_0 entered promiscuous mode [ 857.455219][T17297] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.462977][T17297] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.471119][T17297] device bridge_slave_1 entered promiscuous mode [ 857.486172][T17297] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 857.496446][T17297] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 857.571702][T17297] team0: Port device team_slave_0 added [ 857.579131][T17297] team0: Port device team_slave_1 added [ 857.616856][T17297] device hsr_slave_0 entered promiscuous mode [ 857.665543][T17297] device hsr_slave_1 entered promiscuous mode [ 857.798503][T17297] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.806043][T17297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 857.813834][T17297] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.821101][T17297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 857.913760][T17297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 857.930306][T17297] 8021q: adding VLAN 0 to HW filter on device team0 [ 857.995820][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 858.003989][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 858.011845][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 858.020556][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 858.037082][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 858.047093][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 858.054219][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 858.062132][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 858.070709][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 858.087203][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 858.164368][T17297] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 858.176619][T17297] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 858.189733][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 858.198562][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 858.207553][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 858.216240][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 858.224501][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 858.232262][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 858.240603][ T8970] device bridge_slave_1 left promiscuous mode [ 858.247934][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 858.295982][ T8970] device bridge_slave_0 left promiscuous mode [ 858.302283][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 859.987934][ T8970] device hsr_slave_1 left promiscuous mode [ 860.030790][ T8970] device hsr_slave_0 left promiscuous mode [ 860.080366][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 860.092542][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 860.107720][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 860.171102][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 860.258959][ T8970] bond0 (unregistering): Released all slaves [ 860.421748][T17297] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6c00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:34 executing program 1: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:54:34 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x500000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000007dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x600000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000009dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x700000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000adc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000080)=0x6) ioctl$KIOCSOUND(r1, 0x4b2f, 0x5) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) pselect6(0x40, &(0x7f00000000c0)={0x1ff, 0x0, 0x632, 0x5, 0x7, 0x7, 0xfdb, 0xb6d}, &(0x7f0000000180)={0x4, 0x5, 0x10000, 0x9, 0x4, 0x1f, 0x6, 0x3}, &(0x7f00000001c0)={0x40, 0xff, 0x3f, 0x1, 0xffd, 0x2, 0x5, 0x200}, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000280)={&(0x7f0000000240)={0x7ff}, 0x8}) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000740)={0x9, 0x20001000, 0x400, 0x20, 0x3, 0x7, 0x2, 0xffff, 0x5abf57e5, 0xec5}, 0x10) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8, 0x24111f55edcd7949) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) socket$inet6(0xa, 0x80000, 0x9) ioctl$KVM_SET_XSAVE(r5, 0x5000aea5, &(0x7f0000000340)={"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"}) 08:54:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000bdc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7400, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:35 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x1000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x2000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7a00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 863.168576][T17375] IPVS: ftp: loaded support on port[0] = 21 [ 863.240769][T17375] chnl_net:caif_netlink_parms(): no params data found [ 863.394088][T17375] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.403701][T17375] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.413558][T17375] device bridge_slave_0 entered promiscuous mode [ 863.423487][T17375] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.431438][T17375] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.440536][T17375] device bridge_slave_1 entered promiscuous mode [ 863.517101][T17375] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 863.528728][T17375] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 863.545769][T17375] team0: Port device team_slave_0 added [ 863.611359][T17375] team0: Port device team_slave_1 added [ 863.677729][T17375] device hsr_slave_0 entered promiscuous mode [ 863.705435][T17375] device hsr_slave_1 entered promiscuous mode [ 863.790592][T17378] IPVS: ftp: loaded support on port[0] = 21 [ 863.794134][T17375] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.803989][T17375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.811784][T17375] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.819553][T17375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 864.022615][T17378] chnl_net:caif_netlink_parms(): no params data found [ 864.119986][T17378] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.128000][T17378] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.137332][T17378] device bridge_slave_0 entered promiscuous mode [ 864.148211][T17378] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.159278][T17378] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.168226][T17378] device bridge_slave_1 entered promiscuous mode [ 864.188636][T17378] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 864.268232][T17378] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 864.283604][T17375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 864.298002][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.306493][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.316373][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 864.394153][T17378] team0: Port device team_slave_0 added [ 864.401627][T17378] team0: Port device team_slave_1 added [ 864.423388][T17375] 8021q: adding VLAN 0 to HW filter on device team0 [ 864.431590][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 864.440492][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 864.488399][T17378] device hsr_slave_0 entered promiscuous mode [ 864.555500][T17378] device hsr_slave_1 entered promiscuous mode [ 864.595929][ T8970] device bridge_slave_1 left promiscuous mode [ 864.602477][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.656211][ T8970] device bridge_slave_0 left promiscuous mode [ 864.662807][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.347907][ T8970] device hsr_slave_1 left promiscuous mode [ 866.388232][ T8970] device hsr_slave_0 left promiscuous mode [ 866.448354][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 866.461127][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 866.472974][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 866.519631][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 866.607704][ T8970] bond0 (unregistering): Released all slaves [ 866.730964][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.739978][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.748590][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.755763][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.763444][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 866.772879][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 866.781806][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.788903][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 866.797461][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 866.824449][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 866.833010][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 866.842602][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 866.851370][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 866.860361][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 866.868775][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 866.877236][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 866.886549][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 866.898164][T17375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 866.909645][T17375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 866.918976][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 866.928072][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 866.952573][T17375] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 866.994092][T17378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 867.006668][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 867.014351][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 867.041321][T17382] EXT4-fs (sda1): re-mounted. Opts: (null) 08:54:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000ddc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:40 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x9) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) write$selinux_access(r0, &(0x7f0000000000)={'system_u:object_r:autofs_device_t:s0', 0x20, 'unconfined', 0x20, 0x7}, 0x45) 08:54:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x3f00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:40 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=r1, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYRESDEC=r1, @ANYRES64=r1, @ANYRESDEC=r1, @ANYRES16=r0, @ANYRES16, @ANYRES64=r0, @ANYRESDEC], @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYRES64=r0, @ANYPTR, @ANYPTR64, @ANYRES32=r1, @ANYRES16]], @ANYBLOB="2ce603000000a9983211b3304ac5032fc5d3460ebe0c5d8ed2685483c53ed102438be9a1cad633d8dc7e3cd7f5f7a06968a4c050cc174a77e302ea3851ed3995d52727350a985381a5a9bf4b9f20411d08011fe78f31872ada6f226b920c7f2422a6af9a5d492160b0a2279f3b8ced70f0512f4033d2397265a2944bad4268bba856980eef0f0d48e3b8281242e3b74cf5cbfe177ff941e247a2f028bdc02bf279179c672159a9911c67dfff7f0000c00176e49f2a0886e43e6c2cd41d36117bc7464156c6bc7d79b68fe3d2085f4b62a13449b8"], 0xcf) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000013, 0x0) [ 867.077925][T17378] 8021q: adding VLAN 0 to HW filter on device team0 [ 867.111912][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 08:54:40 executing program 1: munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x2c) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x1f, 0xc6, &(0x7f0000000000)="405225c90ff280cee8afa6812647268de0b292c1149b5b84aee08a6e44d19764bc16da52e7e6b0713524cd0804a57d9a84addeb843d82567b476206a8287bf58abae446a334fe89f3eb4595292515c245075a5032e3d2b5b3d87b755c02c1553ddbb1cb0f6ae71a3244177a8ad457b1f63d8c405d79dc8f895fbca15a2d8e1471455ffa226ed3b87736d0cda97d85ce3ea1fdb60794d08aa5aeec3b8ab199212ce2a14eddbc1b10ccdad57bccb031114d97ea0fc1069f280b78d29e953404389b8adb86542c3"}) epoll_pwait(r1, &(0x7f0000000240)=[{}], 0x1, 0xff, &(0x7f00000002c0)={0xff}, 0x8) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000001c0)) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)=@random={'user.', 'security.apparmor\x00'}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000280)=0x2) [ 867.128291][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 867.162306][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.169619][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 08:54:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000edc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x4000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x4800000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:41 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c002010dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x4c00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 867.643292][T17418] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 867.827462][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 867.839291][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.860508][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 867.876214][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.883356][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.924338][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 867.941135][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 867.952303][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 867.967529][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 867.993519][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 868.004007][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 868.023015][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 868.040934][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 868.059970][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 868.082464][T17378] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 868.094302][T17378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 868.102840][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 868.131636][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 868.185472][T17378] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xedc0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:41 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x9) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x81, 0xa, [0xfffffffffffffde6, 0x600000000000, 0xffff, 0x1ff, 0x800, 0x7fff, 0x4, 0xff, 0x7f, 0x10000]}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0x1000, 0x9c, 0xca}, &(0x7f00000000c0)=0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x8e2d9a2084d729c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7fffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:54:41 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000012dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x6000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:41 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = openat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x200000, 0x40) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000800)=""/191) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000040)=""/138, &(0x7f0000000180)=0x8a) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x5, 0x0, [], [{0x6f, 0x5, 0x1ff, 0xfffffffffffffffa, 0x976, 0xfffffffffffffff9}, {0x5, 0x0, 0x3, 0x7fffffff, 0xfff, 0xc43}], [[], [], [], [], []]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000800)=ANY=[], 0x7f) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) socket(0x15, 0x4, 0xb5) getsockopt$inet6_dccp_buf(r2, 0x21, 0xce, &(0x7f00000008c0), &(0x7f0000000900)) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0xfffffeae) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSTATFS(r3, &(0x7f00000001c0)={0x43, 0x9, 0x1, {0xa2, 0x7f, 0x9, 0x3, 0xf5b, 0xfffffffffffffffd, 0x40, 0x7f, 0x2}}, 0x43) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) sendmsg(r3, &(0x7f0000000780)={&(0x7f0000000240)=@nl=@unspec, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)="08423b727caf2010a202bd249bdcdb4f353b20a3f5f9c000a3317787760d05e380b849208ccc0ecb1e9c59dd4f1529af20792e01b07f02565c8fce732576d665c205ca2a97737beaf2bc77a450223a4b", 0x50}, {&(0x7f00000002c0)="1c4e61f8eeb35cc77235ab25b82bba153cfab77d1f22f9d196a921ca66d5979081477de029709fbf", 0x28}, {&(0x7f00000005c0)="af7642c2047aab74b1f19bf654dd1a3209da009d1568b782168ab2ee89ab5cb7bc78304a08b261ccad728ca53f2cd2968613c7db5d8078e2ea90723f1f42e3324507aebc95c475f8f05b0cabe534461c221df1121e48684a58b3cf8a03204635f2cda90722b31485fca8fc83821f6cd298b55390fd0c0dd6e934f68e7f6d0df95e4063feef5038b0ebe7959e765cc96fb8a5e31c6aa84e6a8affe73ac148b933d9117fde405c6a06e2ced161ae435a2107eb9304dbac63a2c1b72a033a8e33f0290c402d9a3ae805f72706fc5cffa5318fc06343c3f513f17de32073f4c70fd1ec84", 0xe2}], 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="70000000000000003e01000003000000c61462162f9752b82359dfa6b083803bec8ad5bd5001b3122ed11769d50000e3a706c0719965649ac9dc93b7bdfebe45c60fac2f1409cf9e64dc25659f0c5a1e5c1ff1cc9454b1d2f23ca7c3c51a750bf78023199c358e434000000000000000"], 0x70}, 0x40000) 08:54:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000014dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:42 executing program 1: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x8001) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x79985f6d) r3 = accept4(r2, 0x0, 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000080)=0xe3a8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6fb, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x6800000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000020dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:42 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000180)={{r3, r4/1000+10000}, 0x2, 0x6, 0x20}, 0x18) accept4(r0, &(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x80, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:54:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x6c00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x7400000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c001020dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:43 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x4, 0x7, 0x743d}) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$VT_ACTIVATE(r1, 0x5606, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="000086df0100f34fa0db507bae30408cc9ddf682adf877a12f81bf51792ba1e079699ed94aa65774bc87512eaf224fce79b8a1e07240bbc6d797a7665ca80900000000000000a7c723c32906f78a98b6ddf1b3c1f54021d08bff010000000000000f1030aac94e4e717a93446f3a42a0751fd33ed9f8ff7b2f4f5d079edefee0bf5bbea4d9fa33c1d39ebd59c34643a832ef9bc006f38f55544bfb806014d7dcb4f3019ee9a263b4a8f42a32465d7c1f468a66d0bb2a9427083865bb81e136266635ca8ccabfc6dafcb4d89189e7f86a6a2082740fa8c2ce46"], 0xd9) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) [ 869.453680][T17487] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 870.819305][T17505] IPVS: ftp: loaded support on port[0] = 21 [ 871.096943][T17505] chnl_net:caif_netlink_parms(): no params data found [ 871.122375][T17505] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.130507][T17505] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.138638][T17505] device bridge_slave_0 entered promiscuous mode [ 871.261046][T17505] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.268597][T17505] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.276787][T17505] device bridge_slave_1 entered promiscuous mode [ 871.413427][T17505] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 871.424281][T17505] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 871.558310][T17505] team0: Port device team_slave_0 added [ 871.565703][T17505] team0: Port device team_slave_1 added [ 871.598173][T17505] device hsr_slave_0 entered promiscuous mode [ 871.665457][T17505] device hsr_slave_1 entered promiscuous mode [ 871.866606][T17505] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.873947][T17505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 871.881528][T17505] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.888824][T17505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 871.916397][ T8970] device bridge_slave_1 left promiscuous mode [ 871.922589][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.966243][ T8970] device bridge_slave_0 left promiscuous mode [ 871.972418][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.037030][ T8970] device bridge_slave_1 left promiscuous mode [ 872.043219][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.077065][ T8970] device bridge_slave_0 left promiscuous mode [ 872.083264][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.297001][ T8970] device hsr_slave_1 left promiscuous mode [ 875.350059][ T8970] device hsr_slave_0 left promiscuous mode [ 875.410823][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 875.422559][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 875.433990][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 875.471691][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 875.558222][ T8970] bond0 (unregistering): Released all slaves [ 875.748444][ T8970] device hsr_slave_1 left promiscuous mode [ 875.790347][ T8970] device hsr_slave_0 left promiscuous mode [ 875.858526][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 875.871596][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 875.882903][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 875.911851][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 876.001969][ T8970] bond0 (unregistering): Released all slaves [ 876.114593][T17505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 876.124145][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.132563][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.142373][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 876.156924][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 876.164864][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 876.174918][T17505] 8021q: adding VLAN 0 to HW filter on device team0 [ 876.185463][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 876.193997][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 876.202958][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.210316][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.230220][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 876.239658][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 876.249260][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.256395][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.256827][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 876.272827][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 876.281781][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 876.290799][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 876.299335][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 876.308029][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 876.316931][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 876.328388][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 876.337190][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 876.349779][T17505] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 876.361872][T17505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 876.369761][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 876.378779][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 876.394148][T17505] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x7a00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:50 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000023dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:50 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r4) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xff0f, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:50 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1d8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x100fa) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 876.519225][T17513] EXT4-fs (sda1): re-mounted. Opts: (null) 08:54:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x4, 0x0) r1 = dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) pwrite64(r2, &(0x7f0000000000), 0x0, 0x5d) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x55f8}, 0xc) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r6 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r6, 0x0, 0x20000000003, 0x0) 08:54:50 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00f825dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x8cffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 876.879673][T17538] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xc000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:50 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00fb25dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:50 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 877.176680][T17552] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:51 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000026dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:51 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400000) perf_event_open(&(0x7f000001d000)={0x1, 0xffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf5ffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 879.173128][T17578] IPVS: ftp: loaded support on port[0] = 21 [ 879.284556][T17578] chnl_net:caif_netlink_parms(): no params data found [ 879.373870][T17578] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.381210][T17578] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.389119][T17578] device bridge_slave_0 entered promiscuous mode [ 879.397430][T17578] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.404555][T17578] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.413000][T17578] device bridge_slave_1 entered promiscuous mode [ 879.484297][T17578] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 879.495135][T17578] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 879.566809][T17578] team0: Port device team_slave_0 added [ 879.573495][T17578] team0: Port device team_slave_1 added [ 879.637731][T17578] device hsr_slave_0 entered promiscuous mode [ 879.685488][T17578] device hsr_slave_1 entered promiscuous mode [ 879.817222][T17578] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.824439][T17578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 879.831910][T17578] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.839172][T17578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 879.870498][T17578] 8021q: adding VLAN 0 to HW filter on device bond0 [ 879.882386][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 879.892200][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.900518][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.909201][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 879.974315][T17578] 8021q: adding VLAN 0 to HW filter on device team0 [ 879.985260][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 879.993557][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.000654][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 880.012959][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 880.021434][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.028723][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.108586][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.117785][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.126444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 880.134887][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.144178][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 880.152197][ T8970] device bridge_slave_1 left promiscuous mode [ 880.159163][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.216707][ T8970] device bridge_slave_0 left promiscuous mode [ 880.223011][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 881.808148][ T8970] device hsr_slave_1 left promiscuous mode [ 881.858680][ T8970] device hsr_slave_0 left promiscuous mode [ 881.898732][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 881.911328][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 881.922493][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 881.959665][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 882.024851][ T8970] bond0 (unregistering): Released all slaves [ 882.131601][T17578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 882.152381][T17578] 8021q: adding VLAN 0 to HW filter on device batadv0 08:54:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x40000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000428dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:55 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r3, 0xc02, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x44040) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x81, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:54:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf6ffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:54:55 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xf8f73f0000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 882.320364][T17592] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000429dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xff0f000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 882.601023][T17606] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:56 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x24a) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:54:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000430dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:54:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0xfffffffffffff000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 882.842803][T17619] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:54:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x80000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:54:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000431dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 883.168198][T17631] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 884.524219][T17641] IPVS: ftp: loaded support on port[0] = 21 [ 884.691247][T17641] chnl_net:caif_netlink_parms(): no params data found [ 884.721809][T17641] bridge0: port 1(bridge_slave_0) entered blocking state [ 884.729125][T17641] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.737091][T17641] device bridge_slave_0 entered promiscuous mode [ 884.800432][T17641] bridge0: port 2(bridge_slave_1) entered blocking state [ 884.807693][T17641] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.815697][T17641] device bridge_slave_1 entered promiscuous mode [ 884.834008][T17641] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 884.899532][T17641] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 884.918664][T17641] team0: Port device team_slave_0 added [ 884.925730][T17641] team0: Port device team_slave_1 added [ 884.967785][T17641] device hsr_slave_0 entered promiscuous mode [ 885.005608][T17641] device hsr_slave_1 entered promiscuous mode [ 885.109787][T17641] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.117158][T17641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 885.125347][T17641] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.132431][T17641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 885.167185][T17641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 885.235135][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 885.243205][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.251364][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.260006][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 885.271008][T17641] 8021q: adding VLAN 0 to HW filter on device team0 [ 885.346781][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 885.359621][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.367046][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 885.375204][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 885.383616][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.390853][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 885.458462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 885.475976][T17641] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 885.486632][T17641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 885.499064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 885.507829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 885.516584][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 885.525240][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 885.533817][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 885.544736][ T8970] device bridge_slave_1 left promiscuous mode [ 885.553988][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.606309][ T8970] device bridge_slave_0 left promiscuous mode [ 885.612543][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.237950][ T8970] device hsr_slave_1 left promiscuous mode [ 887.280170][ T8970] device hsr_slave_0 left promiscuous mode [ 887.338467][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 887.350061][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 887.365525][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 887.429081][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 887.538308][ T8970] bond0 (unregistering): Released all slaves [ 887.623442][T17641] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x35ba5f1142202760) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:55:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x100000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:01 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000432dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='\nuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 887.724397][T17646] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:01 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000140)}, 0x10) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x200) ioctl$FICLONE(r2, 0x40049409, r2) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000001c0)) pipe(&(0x7f0000000300)={0xffffffffffffffff}) write$P9_RLCREATE(r1, &(0x7f0000000200)={0x18, 0xf, 0x2, {{0x0, 0x3, 0x1}, 0x7}}, 0x18) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'ip6_vti0\x00', 0x2}) splice(r3, 0x0, r5, 0x0, 0x20000000003, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000000c0)={0x52, 0x1, 0x3, {0x4, 0x5}, {0x9, 0x400}, @const={0x6, {0x400, 0xffff, 0x9, 0x7}}}) [ 887.798192][T17650] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 887.841056][T17656] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:01 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0xfe68) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000440)='NET_DM\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000002c0)=0x80000000, 0x4) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r5, 0x0, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x14}}, 0x4000001) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r7 = getgid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() r10 = getgid() r11 = getegid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x2, r3}], {0x4, 0x2}, [{0x8, 0x5, r4}, {0x8, 0x7, r6}, {0x8, 0x2, r7}, {0x8, 0x0, r8}, {0x8, 0x3, r9}, {0x8, 0x4}, {0x8, 0x4, r10}, {0x8, 0x4, r11}], {0x10, 0x5}, {0x20, 0x4}}, 0x6c, 0x2) r12 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r12, 0x0, 0x20000000003, 0x0) [ 887.911475][T17656] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:01 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000433dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='%use\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 888.062253][T17665] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 888.105370][T17671] EXT4-fs (sda1): re-mounted. Opts: (null) [ 888.151106][T17672] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:01 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000434dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='.use\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 888.304720][T17677] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000435dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 888.733338][T17685] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:02 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000000)={0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18, 0x0, 0x5, {0x8}}, 0x18) [ 888.774917][T17685] EXT4-fs (sda1): re-mounted. Opts: (null) [ 888.798403][T17688] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 890.150821][T17705] IPVS: ftp: loaded support on port[0] = 21 [ 890.262237][T17705] chnl_net:caif_netlink_parms(): no params data found [ 890.347629][T17705] bridge0: port 1(bridge_slave_0) entered blocking state [ 890.355403][T17705] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.365342][T17705] device bridge_slave_0 entered promiscuous mode [ 890.373388][T17705] bridge0: port 2(bridge_slave_1) entered blocking state [ 890.381228][T17705] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.389139][T17705] device bridge_slave_1 entered promiscuous mode [ 890.461288][T17705] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 890.472091][T17705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 890.545510][T17705] team0: Port device team_slave_0 added [ 890.552266][T17705] team0: Port device team_slave_1 added [ 890.617823][T17705] device hsr_slave_0 entered promiscuous mode [ 890.675474][T17705] device hsr_slave_1 entered promiscuous mode [ 890.801962][T17705] bridge0: port 2(bridge_slave_1) entered blocking state [ 890.809104][T17705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 890.816474][T17705] bridge0: port 1(bridge_slave_0) entered blocking state [ 890.823591][T17705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 890.854257][T17705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 890.925677][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 890.933738][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.941728][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.949970][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 890.961154][T17705] 8021q: adding VLAN 0 to HW filter on device team0 [ 891.031056][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 891.039592][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.046789][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 891.054505][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 891.063242][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.070627][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.079172][ T8970] device bridge_slave_1 left promiscuous mode [ 891.085589][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.136118][ T8970] device bridge_slave_0 left promiscuous mode [ 891.142486][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 892.807897][ T8970] device hsr_slave_1 left promiscuous mode [ 892.850459][ T8970] device hsr_slave_0 left promiscuous mode [ 892.900160][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 892.911901][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 892.923343][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 892.989039][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 893.057066][ T8970] bond0 (unregistering): Released all slaves [ 893.158296][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 893.169657][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 893.181978][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 893.191425][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 893.204558][T17705] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 893.216158][T17705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 893.228570][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 893.237000][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 893.246224][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 893.254412][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 893.264074][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 893.283013][T17705] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x3ff7f8, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='/use\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:07 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) tee(r0, r1, 0x8, 0x4) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)={0x7, 0x7, 0x2, 0x0, 0x0, [{r2, 0x0, 0x800}, {r2, 0x0, 0x8000}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000436dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:07 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 893.451987][T17714] EXT4-fs (sda1): re-mounted. Opts: (null) [ 893.471312][T17720] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000437dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f\nse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 893.697896][T17731] EXT4-fs (sda1): re-mounted. Opts: (null) [ 893.722325][T17732] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0xffffffffffffffff, 0x80000000, 0x200, 0x7ff, 0x55}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRESDEC=r1, @ANYRESDEC=r2, @ANYBLOB="543630d8da09bb2dbe0f7fa3c4c605ef3d2bc9ee1323ddfa255c49659d3a63417f885aa488a0392c6cc8bf9ff79995b0c298f58b74a0bd74e49e0bba313c54b7d15aef3d4b1fe60db194dddc2fce", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64=r2], @ANYRES64=0x0, @ANYBLOB="d221ef5115663e5a65519fef87b67d4a59645f2a7328fcaf7f8ce66ed322de6685b9099d35540675fb9b8faca104a95b4547db5916663a3f7d4e4a314a1ebfa72bf4b916d9827bed2c6c6a485652009161909f6007ba17e173c8fcfdd4181d222d7ab99112d39b3025031fae7238162db14667e71bac7c93eaff49328c9237177675e6e09b41bf587233cdbd97ec0476e8a4c235747f2a15cd381d4d17de7b0c743894d2388012c1dfd1437f8d913444e50507f5919e7dceaf77d602e466943c0a774b7da0412221fb8e79b665f57758da4867b2f973af70e9f7e5f67c2aa13da4a76c36e51698db19b1f07172739ed998817c951d0fe007e312b7e605278d527294d2e3e027b790c61132e68124148dfc24a8815f63cda079544cec2d6b1665dbe20f160cb1da3d178a1c7eebd7bdc40370019f12971f8814ccc909c5f8e25dea042b3c5cec900fdb"], 0xfffffd6c) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r3, 0x0, 0x7, 0x0) [ 893.760452][T17735] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000438dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f#se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 893.962610][T17743] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000439dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 894.148367][T17748] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x3ff800, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:07 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000000)={0x0, 0x8, [0x1, 0x9]}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 894.424752][T17757] EXT4-fs (sda1): re-mounted. Opts: (null) [ 894.504021][T17760] EXT4-fs (sda1): re-mounted. Opts: (null) [ 895.604189][T17770] IPVS: ftp: loaded support on port[0] = 21 [ 895.669379][T17770] chnl_net:caif_netlink_parms(): no params data found [ 895.730145][T17770] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.737435][T17770] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.745909][T17770] device bridge_slave_0 entered promiscuous mode [ 895.753778][T17770] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.761263][T17770] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.769066][T17770] device bridge_slave_1 entered promiscuous mode [ 895.786552][T17770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 895.797191][T17770] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 895.812757][T17770] team0: Port device team_slave_0 added [ 895.820140][T17770] team0: Port device team_slave_1 added [ 895.867854][T17770] device hsr_slave_0 entered promiscuous mode [ 895.895385][T17770] device hsr_slave_1 entered promiscuous mode [ 896.064034][T17770] bridge0: port 2(bridge_slave_1) entered blocking state [ 896.071253][T17770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 896.078656][T17770] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.085874][T17770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 896.190503][T17770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 896.203706][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 896.212512][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 896.221657][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 896.233469][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 896.247777][T17770] 8021q: adding VLAN 0 to HW filter on device team0 [ 896.313779][T17773] IPVS: ftp: loaded support on port[0] = 21 [ 896.327383][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 896.336312][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.343358][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 896.351682][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 896.360059][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 896.367179][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 896.466853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 896.479068][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 896.489474][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 896.567286][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 896.588500][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 896.598347][T17770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 896.701249][T17773] chnl_net:caif_netlink_parms(): no params data found [ 896.798232][T17773] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.805509][T17773] bridge0: port 1(bridge_slave_0) entered disabled state [ 896.813243][T17773] device bridge_slave_0 entered promiscuous mode [ 896.821438][T17773] bridge0: port 2(bridge_slave_1) entered blocking state [ 896.829568][T17773] bridge0: port 2(bridge_slave_1) entered disabled state [ 896.837436][T17773] device bridge_slave_1 entered promiscuous mode [ 896.908435][T17770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 896.921093][T17773] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 896.932788][T17773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 897.016266][T17773] team0: Port device team_slave_0 added [ 897.023845][T17773] team0: Port device team_slave_1 added [ 897.043173][ T8970] device bridge_slave_1 left promiscuous mode [ 897.055017][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 897.090070][ T8970] device bridge_slave_0 left promiscuous mode [ 897.096789][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 897.099234][T17777] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00003fdc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:10 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3, 0x3, 0x2, 0x2}}, {&(0x7f0000000000)=""/30, 0x1e}, &(0x7f0000000040), 0x40}, 0xa0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:55:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f%se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:10 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x100, &(0x7f0000552000/0x2000)=nil) r3 = accept4(r2, 0x0, 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x1}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) 08:55:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000040dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 897.229336][T17784] EXT4-fs (sda1): re-mounted. Opts: (null) [ 897.273057][T17784] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f*se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000060dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:11 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3f}, &(0x7f00000000c0)=0x8) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000001c0)=0x1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r4, 0x22}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 897.479320][T17800] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00006ddc", 0xa}], 0x8008, 0xffffffffffffffff) [ 897.548322][T17806] EXT4-fs (sda1): re-mounted. Opts: (null) [ 899.347970][ T8970] device hsr_slave_1 left promiscuous mode [ 899.398388][ T8970] device hsr_slave_0 left promiscuous mode [ 899.448533][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 899.462074][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 899.473564][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 899.519045][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 899.611804][ T8970] bond0 (unregistering): Released all slaves [ 899.757562][T17773] device hsr_slave_0 entered promiscuous mode [ 899.795380][T17773] device hsr_slave_1 entered promiscuous mode [ 899.882656][T17773] bridge0: port 2(bridge_slave_1) entered blocking state [ 899.889973][T17773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 899.897673][T17773] bridge0: port 1(bridge_slave_0) entered blocking state [ 899.904840][T17773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 900.088409][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.096722][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 900.139867][T17773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 900.165419][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 900.173281][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 900.185293][T17773] 8021q: adding VLAN 0 to HW filter on device team0 [ 900.197106][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 900.206517][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 900.215159][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 900.222211][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 900.230223][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 900.238959][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 900.247413][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 900.254442][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 900.305314][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 900.328576][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 900.337779][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 900.346998][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 900.355723][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 900.364352][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 900.380570][T17773] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 900.391846][T17773] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 900.405072][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 900.413143][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 900.422606][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 900.431474][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 900.440332][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 900.449433][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 900.468289][T17773] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf0ffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f+se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:14 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000000)={0x80, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0xfc, r5, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x74}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @empty, 0xffff}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @local, 0x5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6c8f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x4011) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000040)={0x9, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}) 08:55:14 executing program 1: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@local, 0x2b3, 0x1, 0x1, 0x9, 0x2, 0x9}, 0x20) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) r3 = getuid() getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x20000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}], [{@subj_role={'subj_role', 0x3d, 'digest_null-generic\x00'}}]}}) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x400000000000) fcntl$addseals(r1, 0x409, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r5, 0x0, r5, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 08:55:14 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00006edc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000080)) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:14 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000dcdc", 0xa}], 0x8008, 0xffffffffffffffff) [ 900.735726][T17837] EXT4-fs (sda1): re-mounted. Opts: (null) [ 900.802174][T17844] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f-se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:14 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0025f8dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 901.003397][T17853] EXT4-fs (sda1): re-mounted. Opts: (null) [ 901.068219][T17854] EXT4-fs (sda1): re-mounted. Opts: (null) [ 901.162461][T17858] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f.se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:14 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0025fbdc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:15 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 901.445283][T17865] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf83f00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:15 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000fffdc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:15 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) mmap$binder(&(0x7f0000552000/0x3000)=nil, 0x3000, 0x2000000, 0x11, r1, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) splice(r1, 0x0, r0, 0x0, 0xb, 0x10000000000) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) write$binfmt_elf64(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x1400000000, 0x6, 0x100000000, 0x4, 0x3, 0x3e, 0xffff, 0x29c, 0x40, 0x1e2, 0x9, 0x0, 0x38, 0x2, 0xec2f, 0x0, 0x6}, [{0x5, 0x8, 0x9, 0x8, 0x100, 0x3, 0x0, 0x100000000}, {0x7, 0x7, 0xffc, 0x3e7402b6, 0x80, 0x80, 0x8, 0x80000000}], "f62a54d986969ad582821053b5ffe2ce0aa3c95c59724023b6022b7898fe3fbc4f39fe0ea542e61b4d878b9bb07ab208ded32513dae982c088", [[], [], [], [], [], [], [], []]}, 0x8e9) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', r4}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000080)=0xd, 0x4) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r6, 0x0, 0x20000000003, 0x0) [ 901.865450][T17882] EXT4-fs (sda1): re-mounted. Opts: (null) [ 901.911287][T17888] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 901.917102][T17881] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f0se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 902.120782][T17896] EXT4-fs (sda1): re-mounted. Opts: (null) [ 902.170446][T17896] EXT4-fs (sda1): re-mounted. Opts: (null) [ 903.415409][T17904] IPVS: ftp: loaded support on port[0] = 21 [ 903.582036][T17904] chnl_net:caif_netlink_parms(): no params data found [ 903.724573][T17904] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.733424][T17904] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.744909][T17904] device bridge_slave_0 entered promiscuous mode [ 903.867753][T17904] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.875989][T17904] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.883901][T17904] device bridge_slave_1 entered promiscuous mode [ 903.903671][T17904] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 903.913837][T17904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 904.048547][T17904] team0: Port device team_slave_0 added [ 904.056812][T17904] team0: Port device team_slave_1 added [ 904.097759][T17904] device hsr_slave_0 entered promiscuous mode [ 904.175463][T17904] device hsr_slave_1 entered promiscuous mode [ 904.343105][T17904] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.350844][T17904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.358240][T17904] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.365599][T17904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.515478][T17904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 904.532981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 904.542140][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 904.550993][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.559538][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 904.573512][T17904] 8021q: adding VLAN 0 to HW filter on device team0 [ 904.706401][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 904.715526][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 904.724062][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.731168][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.739694][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.748693][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.757453][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.764641][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.772348][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 904.781090][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 904.789859][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 904.798831][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 904.807904][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 904.816509][ T8970] device bridge_slave_1 left promiscuous mode [ 904.822684][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.865951][ T8970] device bridge_slave_0 left promiscuous mode [ 904.872356][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 904.917397][ T8970] device bridge_slave_1 left promiscuous mode [ 904.923629][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.976359][ T8970] device bridge_slave_0 left promiscuous mode [ 904.982547][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 908.177984][ T8970] device hsr_slave_1 left promiscuous mode [ 908.220056][ T8970] device hsr_slave_0 left promiscuous mode [ 908.280270][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 908.291777][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 908.303173][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 908.362349][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 908.442870][ T8970] bond0 (unregistering): Released all slaves [ 908.638494][ T8970] device hsr_slave_1 left promiscuous mode [ 908.700170][ T8970] device hsr_slave_0 left promiscuous mode [ 908.760042][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 908.771666][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 908.782945][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 908.821502][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 908.912076][ T8970] bond0 (unregistering): Released all slaves [ 909.043221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 909.055389][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 909.069938][T17904] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 909.081531][T17904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 909.093637][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 909.102015][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 909.110646][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 909.119576][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 909.128364][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 909.144414][T17904] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x1000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000080)) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:22 executing program 1: munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x100, r4, 0x200, 0x101, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x516c}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffff01}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffff22a6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x8000}, 0x20000080) 08:55:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fXse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:22 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:55:22 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000003c", 0xa}], 0x8008, 0xffffffffffffffff) [ 909.261959][T17912] EXT4-fs (sda1): re-mounted. Opts: (null) [ 909.348553][T17919] EXT4-fs (sda1): re-mounted. Opts: (null) [ 909.348764][T17917] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 909.397319][T17924] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fcse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000b83c", 0xa}], 0x8008, 0xffffffffffffffff) [ 909.672177][T17934] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000002dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 909.735899][T17936] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fdse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:23 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2000, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0xfffffffffffffff8}}, {@rq={'rq', 0x3d, 0x5}}, {@sq={'sq', 0x3d, 0x4}}]}}) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r4, 0x4) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000003dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 910.359806][T17953] EXT4-fs (sda1): re-mounted. Opts: (null) [ 910.402011][T17959] EXT4-fs (sda1): re-mounted. Opts: (null) [ 911.798982][T17966] IPVS: ftp: loaded support on port[0] = 21 [ 911.912441][T17966] chnl_net:caif_netlink_parms(): no params data found [ 911.998718][T17966] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.006136][T17966] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.013868][T17966] device bridge_slave_0 entered promiscuous mode [ 912.021779][T17966] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.029121][T17966] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.036939][T17966] device bridge_slave_1 entered promiscuous mode [ 912.109441][T17966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 912.119360][T17966] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 912.135520][T17966] team0: Port device team_slave_0 added [ 912.142684][T17966] team0: Port device team_slave_1 added [ 912.246840][T17966] device hsr_slave_0 entered promiscuous mode [ 912.295399][T17966] device hsr_slave_1 entered promiscuous mode [ 912.401152][T17966] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.408403][T17966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.415764][T17966] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.422821][T17966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.510877][T17966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 912.522154][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 912.530611][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.538908][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.547749][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 912.616088][T17966] 8021q: adding VLAN 0 to HW filter on device team0 [ 912.627804][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 912.636319][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.643467][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.715482][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 912.724028][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.731134][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.745376][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 912.753883][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 912.762100][ T8970] device bridge_slave_1 left promiscuous mode [ 912.770848][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.826183][ T8970] device bridge_slave_0 left promiscuous mode [ 912.832400][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.408022][ T8970] device hsr_slave_1 left promiscuous mode [ 914.458809][ T8970] device hsr_slave_0 left promiscuous mode [ 914.518506][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 914.532146][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 914.543383][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 914.590723][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 914.684805][ T8970] bond0 (unregistering): Released all slaves [ 914.784577][T17966] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 914.795287][T17966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 914.809130][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 914.817747][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 914.826786][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 914.836003][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 914.854176][T17966] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x2000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:28 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:55:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000080)) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:28 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) sendmsg$nl_crypto(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@del={0x108, 0x11, 0x400, 0x70bd25, 0x25dfdbfc, {{'drbg_pr_sha1\x00'}, [], [], 0x2400, 0xa5006af63fd71732}, [{0x8}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x7fffffff}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0xefa5}]}, 0x108}, 0x1, 0x0, 0x0, 0x1}, 0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:28 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000004dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fise\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 914.927018][T17970] EXT4-fs (sda1): re-mounted. Opts: (null) [ 914.951496][T17970] EXT4-fs (sda1): re-mounted. Opts: (null) [ 915.045244][T17980] EXT4-fs (sda1): re-mounted. Opts: (null) [ 915.126392][T17980] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:28 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000005dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='flse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:28 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000000)=0x7fff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 915.340004][T17993] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:29 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x1) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 915.405367][T17996] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:29 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000006dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fose\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x3000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:29 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000001c0)="bba56412fa2d968184ff72b1eabb4f1b9cbae779fa13eff54d19732c5f70c87c725844a534fc54f8eecc0a9a7240ef72636d073c953e26d160a8cdd58c81efbd9b89ca87a1b2b4557a88e3bdc492f1dc9d9465a7e0b8b8a5482eb77bc596b732f38e4d981cf702852861c07ce22696a16d756cdd68bedd17f2b2664b09e246b7fb7ae545ca364fe2c157e2ed3efb37fbd51a48ba7bb92116539371b5f19a2daaad564ccf282b364e50b8e4cbc8ef92cbc607ccc071c77ef4e1b32eb32a04b7eb2bf90760a56a97db01fe30e1f39a9927", 0xd0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) sendto(r2, &(0x7f0000000100)="bc", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 916.055315][T18016] EXT4-fs (sda1): re-mounted. Opts: (null) [ 916.135085][T18016] EXT4-fs (sda1): re-mounted. Opts: (null) [ 917.486498][T18033] IPVS: ftp: loaded support on port[0] = 21 [ 917.597833][T18033] chnl_net:caif_netlink_parms(): no params data found [ 917.681314][T18033] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.689557][T18033] bridge0: port 1(bridge_slave_0) entered disabled state [ 917.697322][T18033] device bridge_slave_0 entered promiscuous mode [ 917.705242][T18033] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.712379][T18033] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.720149][T18033] device bridge_slave_1 entered promiscuous mode [ 917.792191][T18033] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 917.802646][T18033] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 917.877782][T18033] team0: Port device team_slave_0 added [ 917.884831][T18033] team0: Port device team_slave_1 added [ 917.947694][T18033] device hsr_slave_0 entered promiscuous mode [ 917.985367][T18033] device hsr_slave_1 entered promiscuous mode [ 918.087562][T18033] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.094810][T18033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 918.102396][T18033] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.109596][T18033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 918.199381][T18033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 918.211199][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 918.219262][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 918.227249][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 918.236007][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 918.307186][T18033] 8021q: adding VLAN 0 to HW filter on device team0 [ 918.318448][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 918.326975][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.334027][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 918.350962][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 918.359685][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.366972][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 918.376596][ T8970] device bridge_slave_1 left promiscuous mode [ 918.382754][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 918.445904][ T8970] device bridge_slave_0 left promiscuous mode [ 918.452347][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 920.087900][ T8970] device hsr_slave_1 left promiscuous mode [ 920.130344][ T8970] device hsr_slave_0 left promiscuous mode [ 920.178465][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 920.191403][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 920.202444][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 920.278837][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 920.371708][ T8970] bond0 (unregistering): Released all slaves [ 920.496777][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 920.510064][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 920.519481][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 920.527906][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 920.536701][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 920.548612][T18033] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 920.562873][T18033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 920.571366][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 920.580455][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 920.607077][T18033] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), &(0x7f0000000080)=0x8) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:34 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000007dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fpse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:34 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000400)="c71326212d2b7553bf0f67f2a590b6d145ce89d5f412853cd75a8584fe500b0e6e1312d41403e1a17d608befa3b46b02becf8130274f33d3d91808b95f40c085070000007d169129a15fcf1dd043dc5d8404dfb633f3fd7914161464181d88d9f2eba270a5c64622320aa63293d46d9a2127b2a4e5975d9266b35033b3da443fcf892299ca0ff12b64189fef8b8ea4adb7acd2a882b8180e317bdbf6498e7d7999394cddef5fa1356f031c") write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000000)={0x6, 0x5, 0x3, 0x4, 'syz1\x00', 0x5}) munmap(&(0x7f0000552000/0x1000)=nil, 0x1000) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) lsetxattr$security_selinux(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:apt_exec_t:s0\x00', 0x20, 0x2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) [ 920.671559][T18037] EXT4-fs (sda1): re-mounted. Opts: (null) [ 920.747907][T18042] EXT4-fs (sda1): re-mounted. Opts: (null) [ 920.792482][T18049] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000008dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fsse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 921.006155][T18055] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:34 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@gettfilter={0x2c, 0x2e, 0x820, 0x70bd2d, 0x25dfdbfd, {0x0, r1, {0x7, 0xffeb}, {0x0, 0xe}, {0xe, 0x5}}, [{0x8, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c014) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000000)={0x1, 0x7, 0x3ff, 0x5, 0x40, 0x3, 0x3}) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000340)=0x1) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) lseek(r3, 0x0, 0x3) [ 921.079547][T18063] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000009dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:34 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x7fff, @loopback, 0x6}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x1, @remote, 0xda1d}, @in6={0xa, 0x4, 0x7, @ipv4={[], [], @empty}, 0x4}], 0xa0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fxse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), &(0x7f0000000080)=0x8) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:35 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000adc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:35 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) prctl$PR_SET_THP_DISABLE(0x29, 0x1) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:55:35 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa7, "5e50d545f6ab7b241a2a9988d2ad891ee6f3bdbf196b0d107ed5de069a508fafd48a7fea5af963f8ce6ea9a5f87a4fa6b0d1981025f29e4ad6aad8e6f9a0e16788b296a921f08fe6abf27a1a16514fc939f9f8711d227e6ed212ff840f1dbf637d3eb980fa5a3a9d0d9865da2761a0d06dacb0b22864eed912f70913b484c18cb085d56feaa39df20597a3f74963e04551f59b38d0a1fdb1e01d814fc051d1f8e20b504632a6af"}, &(0x7f00000000c0)=0xaf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x19}, 0x1f}}, 0x6, 0x5}, &(0x7f0000000240)=0x90) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 921.829331][T18091] EXT4-fs (sda1): re-mounted. Opts: (null) [ 921.919896][T18096] EXT4-fs (sda1): re-mounted. Opts: (null) [ 923.277320][T18107] IPVS: ftp: loaded support on port[0] = 21 [ 923.449934][T18107] chnl_net:caif_netlink_parms(): no params data found [ 923.480736][T18107] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.489087][T18107] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.496830][T18107] device bridge_slave_0 entered promiscuous mode [ 923.504717][T18107] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.511902][T18107] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.519680][T18107] device bridge_slave_1 entered promiscuous mode [ 923.590940][T18107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 923.601434][T18107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 923.617941][T18107] team0: Port device team_slave_0 added [ 923.680266][T18107] team0: Port device team_slave_1 added [ 923.736964][T18107] device hsr_slave_0 entered promiscuous mode [ 923.788334][T18107] device hsr_slave_1 entered promiscuous mode [ 923.911429][T18107] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.918583][T18107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 923.925948][T18107] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.933086][T18107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.022960][T18107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 924.034306][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.042400][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.051477][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.060232][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 924.128891][T18107] 8021q: adding VLAN 0 to HW filter on device team0 [ 924.140404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 924.149304][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.156671][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.236782][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 924.246073][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.253117][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.261597][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 924.270531][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 924.279066][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 924.287761][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 924.296373][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 924.306057][T18107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 924.323169][T18107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 924.330909][ T8970] device bridge_slave_1 left promiscuous mode [ 924.339342][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.396843][ T8970] device bridge_slave_0 left promiscuous mode [ 924.403023][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 926.026974][ T8970] device hsr_slave_1 left promiscuous mode [ 926.089352][ T8970] device hsr_slave_0 left promiscuous mode [ 926.159994][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 926.171357][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 926.182747][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 926.221570][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 926.316886][ T8970] bond0 (unregistering): Released all slaves 08:55:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x5000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000bdc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu\ne\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), &(0x7f0000000080)=0x8) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:40 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x422600, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x7fffffff, 0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:55:40 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000000c0)={0x5, 0x5a7, 0x7f7d, 0xffffffff7fffffff, 0x9, 0x4}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x1, 0x4) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000000)=0x80000001, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x2) 08:55:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00000ddc", 0xa}], 0x8008, 0xffffffffffffffff) [ 926.612496][T18118] EXT4-fs (sda1): re-mounted. Opts: (null) [ 926.694745][T18118] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000012dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu#e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 926.959233][T18135] EXT4-fs (sda1): re-mounted. Opts: (null) [ 927.015610][T18138] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000014dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu%e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:40 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ax25={{0x3, @default}, [@rose, @null, @bcast, @netrom, @netrom, @default, @netrom, @bcast]}, &(0x7f0000000080)=0x80) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005d00)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000005cc0)='bdev\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003b00)={r1, 0xffffffffffffffff, 0x0, 0x312, &(0x7f0000005c80)='\x00', r2}, 0xffffffffffffff3e) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000003b40)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b80)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000003c80)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005240)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005280)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000052c0)=0x0) r10 = getpgrp(0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000005c00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x9000004}, 0xc, &(0x7f0000005b80)=[{&(0x7f0000000180)={0xf0, 0x16, 0x0, 0x70bd27, 0x25dfdbfb, "", [@nested={0xe0, 0x1, [@generic="53c5b86f5d383f57d51c9bacbb79c22cc2b63d67a7cf64ed633cd63fe38702987ed2e4628ccceda6738e60cf579e7bb3739ed33654114adf9b5e42eada7950bb1b25cbaaf7302d27f255914c5ae580bc5c1da5a13ce5e06b3cc11cc590718be044deb8f181bca55e5ba060e72efd8af46a6077ced8bf139849eabe4a2484c94947e8bcabaf3d664dcf89b2260bf846e683f1ee8ffc02edfd84c4d1fa5e2f7663acebe1daf24ade37204845a6fe7653a8be67c9d6ac7bf2a6774c85d865474a59888d7d6534b99c6209d31b", @typed={0x10, 0x7c, @str='\',Gsecurity\x00'}]}]}, 0xf0}, {&(0x7f0000000340)={0x35b0, 0x2e, 0x100, 0x70bd27, 0x25dfdbfc, "", [@generic="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", @nested={0x10b4, 0x4, [@generic="304b9d0fa496f90907732483c62a5d27460fc5186bc0616f2c55a2bfdb98d050bfafc97f5f49cd4164a5b162d0fe714511c3f37a75c44c5df9b36241a3391085723c6c019e475d0d927b462796a1b3c57fc610487e727b081cae37b91aa12cbcdc890657fdaa2e3441360c2680891805345e6a5fec854b0349206e5553766dce7bc292f534886b06eb5a420b967ee0fa5d46e43a853eb78f4b4f6055", @typed={0x14, 0x94, @ipv6=@rand_addr="5b172b835c27c4b67389bb9836ba3370"}, @generic="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"]}, @generic="d8c30fe71a811eda3116c4c694255aebe0a5448b99f537435d4fffafafde91f6c69a4bad9c70fc3d2564823cc1cb4473a9732a60a807b169be711d63db331d018b09eb0b43dac40986ddd2a282894dd1521a657c8ba4de88992d30e227e113f2678cb3cb404df418942e2478ed21213b5ab91ba01648906c6203b4a7907bb7feda65c86d7f44aab859fc9256215918867af7d34c33765b7f3968b9855611231a20c565dc8c88d5a2715b589687743c81bb2dff6b7a758eab4e7da924931d97ed766967ad51b5acd43bac5f5e3b78495ce4292dce11487fb06b9ff15a91733d1f9836", @generic="88188e002526c2dbe69b84e00679d3d8f41794a0ce2f125ebcf68110cb89723fa5c3af195da6b6f8465f8458ffe1511fd9d5e10d308bc4e1ccbe5be77ff335945c70d997b873c1464f550874cbc5f54293a338780e49adf776dcd4f0634417b1b8b9eb812fc2075ed853e6a8379b2a099b4d0daf941a63fd7af7fdc0c84ab45676c85506607056331ff6252a0bbab5e7b903ef4f099ec25b4c88789ece7ed2db45b0d74b2f0f21811dde6517c72166fba9ab286b38ca6e27f9624760db6a2bbd03f87057175b055575", @nested={0x1288, 0x5a, [@generic="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", @generic="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", @typed={0x8, 0x6c, @u32=0x6}, @typed={0x14, 0x2c, @ipv6=@mcast2}, @typed={0x4, 0x5}, @generic="639ea4a5be58456b0acc2c22fe9fcdc82354ad14a792a889f3d59dd8d76fa8f4e8f840a61c02e7bd8c937e3815e4cae6191054aedfc9ffdd2b9da0f2186f5fb6cb092808fddc23025ee65ee8f5e133e4c25738f35e5b2cb7f36b0bd46398e099e1c299ac1dc0861dace720f567e319809c64eb88a3663b1d9589a57ae3eeb76340b72a1f759ba099f701fcb7ee377b038aca65e4fd54d1b65d36c3784c8b5d546abbb7059009208a282fdd04c40f7ab234210272add9b9a1f57354ff29ee21305ae596ed5f93f7f62930f138f42ebf312eae4862447a74e7557d4319c0445fb17ed53080c0bfda05760df0d621cf292f2dc81590d190243d26bd9698023013f2b99a4e08164cee5d258824f9d516742ac6958a6cd4e431d119791594b5e9f46ce88cc3b0e60bd3673b25dbdbb224681dbe9d5907fe12d283491e32063298cb334e694c673f5424e1b5b0b6c421d24984bca249af72223618e251d4dc34a027227a0fdd65a03ea3d9e993780d555e1e9079ac7470d6d754a944cda1fe6ad7147b75850ea69bc2a1efbed1d65cd5ce3e3a217fa5f5de03699b2e3adc14b33a87b3d83ec8bd0e3c022c5307c030c18c1c65ea395359c407cfb6852e7da2df6ae2f9488532b6cfcba450e9abf2697050ab188e2546d9220e969b840965f6130f7cf6a696bea4853269cc9de4c6b5b8dbc3acf49200bd8aff4e5c0ffabc9f0f5d4a70e27b20abcabad03ea4779baf5f59a09dc04422d4741336b87a94c0c17912ecde9f772bbb4cb5c4c44949172105a8ac9cf3b02dcedec20b61349debfb7c8aec588f4a1a0582ad7e6a75dc1042e45f3ca8c1e1c5422fb88383b1dc3f6cabacd8ac2361470707b78d40e50e73d37c01694a76282385f848c796af876b4f7cfe520688b9529173bd94e13dc205b6e334bd2d8bca34ed6f9a9fcd8d5fc4efcb348509444a88a2d20206c7818d22d2f6e61e4a0a113126183bf4f5975fdc24c9a125fe2783e571194b247c9ea623e486f9eb7f5d340dd51d0be93ada8e25d55827b3ebcfb844bb74c3a78d9c80c0542d8f1207c10b7abcf956e9c702605d1340162f2d68ac9791c7aa8a778bedff81ae89107e91e4eecd84835bc6b1f977c59e8089fb83573181686b0960e86ccdb4f038431a8de8d97036c09c19418d62d86664592b712331ee8eb8c8826e24730dcba5ba1a20a4daec95a6eaa5280b741372f852f54310eadb8f1e15a90cd5d515821fd79e42aece1cec3889a7bafba329bc706e52d73ad90a90cbb003bb8b621e74e41b11a3e2c151a34641deff6fc8374eae670c96d8317342947c557e4323e6c114b941ab8ef9fac4081be819566a56731d08995ae876d265bc15de89106c3282e7319eaa9cf4bc496ef4694a3fa58dbc9a7460056cdba997bffaa80cb0eafba39662d56b74ae23bfdd5ed6c87994738eb542ea4589c989f9fc823dcec3911e9f5d7b1a67bb065c98966110a50990deeb91825904c39bbe9929d44572a362e71549981721c930548ffe068d6a4e62e0c36c2eeab04b8c5ea39f8d3afe08421bb42a114ebe72e1bceedc15d77c2bc3826b15159d95404fa4a666e58f1cc4bad46c1396123a65e55eeec5d68f3ecc974e276ffd77166d6a1ad2b0fdd3f1d21da9d2690c61020508b7cd9c2ce4a0a787dea9603cab5bbee743ff22b0b6bb10b1ad978a5729ed5c1a612cc5182d31beb0ce929ac1dca3f39500b2524901f78d29e658dc677fc17d6d6f1a2c52c465f55fe930d4edba58fd2e6779dd4f312b50f588c17ac7002b39594b44378d8807d0a0b630289fa61ff3168125c5a5e063ea4b8b5aad004cfb77b0e2c4eef21a9cabe75abfc45ba39d4d2d1fa7bd1300b6c9ee16d8d710e08d1299b9c98363aed49779ba0ec83568d06685a518378ca30d2aa2906fd673eff62b0786b58d668f9b5c1b8331e45779fa5604a8667853a0c57bac720c7b94a781840ed428022c968994895854f60f196a6ce64dcaf726bffb0b8087876b898a5fefdea0db6fca3e6054aa840e2b957e8534f49670951e9b0914b45283647a5d4f35ab7de9eac8d9c12f2324a5ea809a39d837a980416e240307d333ed6a39038b710f82393bfa03fc9ab7e657c72e3fba9b88fe3aca300e50c714d3ce4be6909c194ed2aebbbc4ea1f488443628875ed85dad9bdfc08c0bcb2ab662cae96a4b3518eedb8a41aebe36cd41bea863465a357249159edacc7b2a09dd6941f16205409209768d9c265d405c57aab04c38154c68bb3079c42b6f5fbe931d51719da0dc7f8a4582760d541da29e3145b1c0b879bfb5008338ca35532c7abae0adfebe3500b29c3ec889f9aa555a98038ed4986b1d42a8fdfc479e3aec7b9ea2ed0d31e39ac0754cd185900e5eec44f3b6553ad6ec4e824068a9c947a36f5eae1f7a53f166f0e273856c9bc6cd971f679901109e9fda51e3ce79e59d7c0390383bfcbaff1f37266f57d1adf19a56faa2ebe24f71f58ce133360fecd51a44895063293145c252559a67afd0b6d7a6bd330bf7414f845c4ef45e71775f53a11fcf8d5274baf3bed961f7edbec97cf949fc8cc60e3eca19a02ed342a54c60b4999b10e308d8a3e16342f19f32718af20e3e2eacba026efa8354ddce52ad35e41825784d634fa5b3ff68064c3240ff75c345f018bd94f200b00b2857713f682df9de45febc2f2aa17aee755367e13a873a7e3b509b0c62205a5a52c93fc3986b326f146e62ab04d60b2b61aa1b36b3a78a67d755de97693fd8add97493bbb1ee5b1a67a64b66dd73030fa6f844256226a142059974aaf50e575bc6263217733fa39bfc418294ad7402541065027927d5588647556627e56c011d9516ccb87121de652c76413f50966750fe756f40809e52b4e5e2ae653958c3eab902b9e56b292921ae684677fa014638bc3832a78277470950278b4df29d3e1bd01cf0c69cafe7b3368f517f4d4d53dc29d73f4003460b60ca4f9da360a11c2e7200eff9855ec15a24bf49d45140a83e102c6f46357a1b41acd725c0fc4193bff412185df6623facb03c4dd582ce8af1b9e78d3e8027d65c25a0342f793f4054bbf17e70bea4c82ce141902d15d8aef681af099b1a431c7fa729bbca673550cf56d10adacad0f8fb0578325e21aec24fba2d91355ae2340dda1f200b1bdef63cd9dc4b71a01c064e40c4ce755c924d1fe4c0d087710c42327094aca0d65571ff9cafa0eff4c5774694783801e75bb9d2a326242ba4b51594bb664c2e8dd2d6cffac7bc12afde4c722e39d315561bcb495755c9867d8a90c322be06e6514ce415b1a1d6afab12b082060a27ab84180c95ec7d0e8a1d9751d3958501470b2f808aeb15ad59858c966f89fc945ff6b63c83de43b6c69f4292cc51660fcd309f3507af888bc3e8554aa8932191197fd6a28badb3dc94573f5ecb73bf7a18ef23fc5e335e33edf319c3e63f2d78d710dc8231f3ed620863cde2f7d89c43ff28982d8bc4d35d3e80336894cc0b79607e679d571c8911094f8d16e913c20c255ed2b9eba62b6cfa6353c17a0c974f4aad95cd6b8f40bd85f8da9b429fdcd03196b6ec9fe8248368f3a47c57a1d240b176e280d3aab8e654967e2d4f9c7210a141c009924736e1d51900d07c3b07cd2aa291e17dc73eed1f395121520ba3e3c824ad769270896c3cc521268c04a553b45a53a1f57bb41afd840398f7d86d310d178536a2acb9367facfbfd7d49d7c551de72807f005b552df8d7417c513862ceb8baa0f586972821efc964403598dd09cf77d7f23fe2300d3b2f5f9ad01f6e83b7bef172a89e7978443ef3955bc53ec86543ff2536739f3634fe7a8e36dcd1d9782d0bf431e2e7e767242707b72270943fd0d73eb7341a93b99b74156bf2cb75a21226926935e6086b8f3ac72560988ef3e9c372d2346aed223aafe61a40c6c88aede9895d0db17c2ac0077d832f0ae60a44ac6d4ff2c09dac0f2324815c9da7e6c7b1d7a5b493b0258e7932c7ced0324f030fc3c0d96c3bb84e0eaa9c5b12e80898cebb5a12af8d3b3f9f6217da193f5a72cd5a534011de4908539621b0452909cc533da41ca30fc3fc4a2d70106f1968d058d9c8d1e4da35c190b8e495065323b4427a46bc6e050c454a6fb5254eb8e98403f84a501da6ac808c87ff3c7e2e55b48d89941591db20ebb265a5f7caf39cc453def0b62896109511881a5c0c4af7e6cdeb3be3cd24c3cb6d048acb3cc78fb5b1e938e7a8872af9f1786ec6efa13474d786c642f703e903440837fd0b4b4c459dd44545ca3d47ca5bae869f7888b1f048f7d106215e06e620ef149317d7a50c1edd76bf1615490cb8e019c62f327e37d07141ad3140d014a3ef2ffabd1c0e841ece61b7bde33e3c778df4d3f32f0409efb6ef2dd4d08f79c81a42eca5c07ed6045dfb1798a768d7823e3ee80baff64712b67ed6a90483c55ff5686261bc0b8aa0fdf58a70398df04ce69f80b1b0d97163a010aaa7fedb053dcbbfb2c0a8e5053209b934dba7562e98561398ee736560177382b78de3c7d20d902c52f0d982f6a9083daf1316dfb9e38ad3d705e278d26600972636d5920d135b60e0aeebbd7865ce469011c5fc0447bf3dec99f58230aa3781610997518e3a26104bcfbf190b671669f6503233489d1528a681c2093db74572bfbe0e7c3a5fb773c568decbb1167f6a713d565c817457cce56c9004b10150bf5ea67d3a70146f028a5b6f02557588a55c41eadb452a0fe1fb70602e3516880347bf297279049ced8d62e619c77cc1ea5a1af70a3f60e25a09b52fad685f616bad94c2686f54056e49ce16f4a3b562a83e735514a6e9e052060a4883bd6145b1893b96c7072314b470b201b4e935237a7ce55f4ce9b0da27d29ac941b3c08c1c68c117e7f590af312dd849e533ba6ab49495d6ec1b692f41727cf9a6d5344d24e1bed61329e6539b42f06db3d1ab2fd17c016b9622c5f8f16633d29ffff2ac8ab4961e0b4774fce58ba583798529f5889f07b618dd1639628f7a2573a695fb2cfbd2711de6ae420df3991d865d1ba8fb9b56cea48ec37a13801060c4999c516337950021ca85ff2208adfc45b59a393867e5d1762be88235f22c90e4dadc3ccb9c602aee204e610ded46bca5cb095ccdcd8507f4ce278b3c661514d762bf4dc70cb921dd2b2e747672e05a3ccc45d62181c2ddcf20506ecc9d7b4d4dc514f60fd97f446ab89619db102219cca28bc3fc6f6c79d23f9418e7a8a0b70ba3a025504e4c74d91503f3c6cd92199f4610bca4b5102aef6934cf973ddcce90f7e939405e99189c4c10d291a22e888346d22ad8951b4bc75f1086d44df2cadf1672bbd9797bdc71d4ee85aab10f18d7d209abe0665cec4da39d8894d4fe0be391f9acac1583ce89256e428c5268fc1c1cafd3aa3f11b12b0071811912d612efed5db3ce3170e8dbb7e9245ac26bcdd82a67e2e274fd9205688ac2ebbcfd2f2df0ed1c9a41ff3760b151f9ce05b1459b4bf045331cce93728b3576088eb04ff95d107c1b8cdc024154859a50a545e0c5ede129bf046315a25182fa5ae303e50b3d1c0434c8fefc4de48f52f9280c7ea3c34dba5351c35b8995c778154b70504ee32a8f0abb99dff2d6dc82a54a8eba7e87648a806a4557b439f85efc7bfd4081ffa87b693878789a436ea2186653d17246599178b4b3adbf852d63d89cebb245e58b84b3132be352ea74c4f7864fa6b41539ec38bfd8c7c622af1657457a50cb975e2614a27e43e2dd52ceb56d1de43e9efbae4042ec6fe9f255afb4084b", @generic="6ad3b4681625db12540cc30a8089e49b1c2f30d09d070ba1b0da8b8e940bcccbd6f297789308d97965704e913f77b556e676bba1f7181476eab488482b25ec31461d40068dec7920ce426aa1ac37ac15", @typed={0x8, 0x13, @u32=0xffffffffffffffdf}, @typed={0x8, 0x68, @pid=r1}, @typed={0x8, 0x43, @u32=0x7}]}, @generic="f05880ff1956b37bb27bd8f6d5655b07151b5840f85d90c28dad196119e9bb5e661c3ed52c97398b2282e2ae6ed0ddd6390cc6d5c9fd2c154899eab23b4094b4a097873d696bf8f91e65559f0873fab5b854d1a888f31f8cfd22e7025b6c983e5a4a543b893a8534b2ddc91675e3ea5e1a96dc5403dc24cc6dac16adea0b923caedb28d83c0cd95b88bbfac5e752e390cf55a57b4368d0b4dd85eb982859b6d45f9f5657f6a8abac0fdcf9265a8b9aa66bddd677b758f364"]}, 0x35b0}, {&(0x7f0000003900)={0x1e0, 0x35, 0x300, 0x70bd2d, 0x25dfdbfc, "", [@generic="edeaa2e85440b49c240ac9d43d875a36387a29295b862dde34e14421b85ee70aed6bea3c6201370c3989c311966c51f9267a2f35caf76b543b49c533352546ee3db04fff6315ab01732cd55c84399204e133b4b2be2e9b2453fd679431fa4f2d7405dd0851d3c3e27728ca0991fc29632c283dab634d125763e54190ba2f5383b32dcdb453e44b049b7f61b3448cff7fd4ff69a8a6fb52bde2afdebbf480dce8ecd52712f1e02adf193f57bd3b549d66b11bb9c6515f63ae", @generic="50f1c0861a0ee85d9d833e95d6b5e1292e5693b307c7f9b090afa85d8875d9428fb5817372328b0f7e9f06eb71033cfc8b59d73647befe46b6676231dac1045d43d578ae597393336d7f52ff1698ac6fb959727893ca41f765f2d4ca98374139f9a4da8f65d7e854b5b7ef92faa90bd4db994c67c18352db38cda278ed631fff7eb38e846670112eb87df51c578582660639c212c00e0cf3b9a0104c58167838eccddeba230ab0cccf13c43816859241c8ea377f3055c5abe110", @generic="89ee7d37242a71529a93ed82d01b3d6bd763fe984436e1ce5baa0233105afa665ddb77be44061aac983618526305616efbb7db76f580a35fcb9a43f8f0c81a36a6ee0855ea509c36506356f95a05fffb36319f2549eadfeb70adf0d19839"]}, 0x1e0}, {&(0x7f0000003cc0)={0x1568, 0x24, 0x4, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x100, 0x3c, [@generic="e35e6ce95248a3100c0299406a1c31006a53397b8551102254bc13efd7890d50fd7f636a501bc73469ee8f37e2a451ea6b5ffe42e04f5e5a6fd120c22dcefe2d1338854c", @generic="c4819c66b28abd230fc2e9298835a9c13d5ef28973c259f17bffabb0f447fa54ac7162e04d75742815f29d34da275641a26cf8cab3fa27d1416c9b40010ee2473e55e74cff13a3752498ccc9c8b87a3c6f79b49d9734bd8b241f7faaa96649bb5c6d923237fbf8d60b", @generic="e8d781ff29b56b624c0d7144ad1765a8a395ccb3aa915f70f8995114b4c95f8e0fb9466d5d63e077c25a549c6e92183e6244b6e33d91690911adaa4d6266d55873fb187aaae556bc6c57fdf2d2"]}, @nested={0x1134, 0x70, [@typed={0x8, 0x79, @ipv4=@multicast1}, @generic="ac510542bcea312ba24b0f52b1d6fec4e6e7d835e542466b3d1417f72ff419f97850a942301fed6318c41cf66f7ce2e73bcf5dabceac1c040545eb117e3cb382b7448585faa988036c7c83561c970888a8d8d60b6142cc35d2854641a216e71cc4ede3b29cd9f150038deddaf2e99217e83c4c78cca54d468e93c5be7779cfb05b35a175e6cbb2a127db95aafb8245ae9693f4fb1aa4d0f7cf4b332b73644a76961373e6cb1e05dab2fa15acac1cfb9bb9", @typed={0x8, 0x25, @pid=r3}, @generic="4d11e0d484d834c7df0f0690356bc93d1b71729fb04a9a6de0c855b4c4fafb9ceeabd6017ae9a59d323261d7a0519dbb695c4bbaedc98428c9faffcbca85dd5955118d40b1a78737e2e2331c0a8ebcbd43836f37bad090369f029029", @typed={0xc, 0x47, @u64=0x53}, @generic="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", @generic="4e911fcff4df9c"]}, @nested={0x2e4, 0x5f, [@typed={0x8, 0x5b, @u32=0x9}, @generic="fec452f09d096c43b1147ed6e4ff36889a75ef7f0927507dcb19f7036f2510a18cba7670e784efe379ce6b8ccfcf34f810ed8a6e89efbc7d3641e9820a25e900863ed5cda34d1c2450d43ab8d4b87de4", @generic="c0557bb876903bf683a0a9f9d1e42190a0338142aa4da151e09af799b99a2b74ba4737d0cdf26dbf4111d343d45e7d676a7661d4159313e48b29130edebbcf411eb3151a11a82c5e5cbdb9b9ed918ce00bbd0f6a632ece877ebef820a2ab8f95aa5ef7d860f4683d294fbb1ad2bd", @generic="ed68d8a9f0374c1c91a67a97ea6bdf813ca0953f9033a4116dc8f8687efdad1a0a1695813bd6093ccdefc1e3a67d7a91881c868b3454b8750a0267a833cb3ee3a1a38fa3f741772d0c84daec70a39055815fdd20441673a150da6504d87ad12e13794683ca", @generic="6647d716113374e0d69b09e4b274f12e9ae2e4325dd5cb116ae0556b568f1579b300dc729c41d9b15e6b2cf3fff307640430d7bcd122e46e307e5a0b79562e7a16c34136b47f2e210cd9b2bba66aba0763424ee12e077ff2af58cc68aaf3f67d1993d167df5ae4390e954d6b028255c3a59562d4f5b708d9cb7342e122d1657c516dea1b44f00e220a41df0e4fc4517ff5f434384b7117f97bbdb91f8f29e36f855bea", @generic="2b3d82aae3f2e7074f7100b3bb43c8c5c6651cbc78244073bef9178f1b36581f8f5a3cb7eeafa2a8ededfb6032526baf6739a0cee33b47512507a48a305ef834415bb2c9e8f910b3dcd6da6470b7ccad52e11cf0f3d9a06465cf2039c2642190596d6dc796", @generic="cbdc4c8f4f26a7310269c073e3878d5f0c19c09b191a5bc9c275c34ac6226cc61341bdb651db36ef3177bbcbaedd087dcaec633ab97132c1a1ed9580fc262471599ea02664cdf02af015a5fcbc2c8a11f789d6983a5eceb87609e26cd503aa947501a3029457a5b42787872aba9d3f3c3a2a7b23793b1263785e5483e9d21d185406264a3ecf3dd49041a34deb2dafa0a4ec778faecf63c02b5e304b8aab8d4f6bf542c83048dbb3d0a19e56c0"]}, @nested={0x38, 0x5b, [@typed={0x8, 0x3d, @pid=r4}, @generic="4d6aa71b1c7d2926abe61b03dee20159c531792fd7a4847a74c3be5dee78dd9a2ec48b73d8315cd06d7c"]}, @typed={0x8, 0x21, @uid=r6}]}, 0x1568}, {&(0x7f0000005300)={0x37c, 0x24, 0x202, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x8, 0x6f, @u32=0x7227aa1c}, @typed={0x8, 0x87, @pid=r7}, @generic="00640bc7b1aee06ea07b40916bbbca983499cae0ea37d82c93bf0d29017f7530997f6686f2b31eb99147a03e5a52df4b5df6d1a8ddaf8e63284c926ac96781f24e6bf59d1a5609919769a7082ec570ddd7e3b2dab7fcb4359e84cc848813300fa2c0edde37ecc1c2f95c90380de7e2862e1ce3afecbd", @typed={0xc, 0x66, @u64=0x80}, @generic="cfa81ba01a544f4ff9fad482ea99bf0188f4ffd0ad1ca953a41a1dd9a77d5be080ced0213898c51fe9124a4afad670f7cb3e8d61b34ef95ff129e71b72b2eb7ad630e5fafe60dea40b5c645968824668014d79a14c873c8128f55f2e014cfe7240bace8435506f6ed0a861a4ca728c58594b3f53882d602246725d7dfdee3d7461b7614f359ee4a703cdcb3a94366dceac95012c84d62661f60f8d2bb15944f2a600cbe0525aac1fcaf72252a19027375b34047813c4120cffe46728d9d5b2d582ea32912e34711d3f819b99d78293a38ff37ea168243f954ded94478cff5ec914", @nested={0x18, 0x94, [@typed={0x14, 0x7d, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @nested={0x1e0, 0x3c, [@typed={0xb0, 0x4, @binary="4eeab70f7b582a200d96270e6c7d37c800f6f85d2346b9749a1f842773f953deb2afaccf04628d81171b270fc747f15edd6011338a3e938e378f3014a0811601fddc42dffed08ddd884027cbe2761037fe3a001a1c57baeaa1da7d5b42ae3722818f731c9c5e2a14d34d80d1cd2be357f4c98f2fcdaaf660c6cfd7805efb836fc22a42066a8e531239ab11b3a4c3b02970d1bdc00e5a28e0196fbd28e6c6c6638314d973647dceba3d9585"}, @typed={0x8, 0x54, @ipv4=@dev={0xac, 0x14, 0x14, 0x20}}, @generic="a435d6290633497946230fe3205e3a6c0158d9602ed7cb1fb9931ed73e87effc4d04552b503a2727ab1b49a072e15f3bd280ebbb4f57e7c239b8829ab186a8ed1abc958bcb2d558c0b0fceb38fe9e51b2bc19bc2560f27d44235abdbf0064bf81098b84a027da5365c18e0b8ac073bc138ddc8b2b34f4a9a070edd2be9308f4b9efde28ec0cdde43a270ffbdbb2231554c2b3bdad35378774741afbfe247be54a88da4343a306167fcbafe2913cf70bb46af5c2ee7a925ea44454c105a8d96a6ee298059b4c56813b14aadb143f5", @typed={0xc, 0x7a, @u64=0x5}, @typed={0xc, 0x47, @u64=0x5}, @typed={0x8, 0x45, @ipv4=@loopback}, @generic="c621982dcaeddeee95c983fb17c7f78858314a316a14cd454b9106", @typed={0x8, 0x5c, @ipv4=@multicast1}, @typed={0x8, 0x92, @pid=r8}, @typed={0x8, 0x3d, @pid=r9}]}]}, 0x37c}, {&(0x7f0000005680)={0x16c, 0x13, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@generic="9ec2313052095bc10f88569d9b27330c49304b7723b6ced56300be0a6f2f385b4c67c4088e5db6228442eae725dad10e559b6c5558fd75342bf58d434755a8adf6bbdc66701b0d5ba69404f3600e9e56ae2cf6aa47b44d05b1ebeeaeca81eb242ef77df2811f6715b3bfbb68c14112530c9301b96bf7b821b4bfed42fdf844c5ea2fc744f35e1180cd1ef0ac6ffdbc4bf78910556437b0c7703c70572a04aa7225ac1bd7cc8a260e1f0846daf5e5ad", @nested={0x4, 0x53}, @generic="7eb9f71a09eb72c9c9ba53308cb8b6c6f8067973919ab993550ebeb5cd5370aa11ce72f8e38c9300e506a1ee231bd24c1a08e0713df138ed7871a29ad564da341d66a5d02802f97c3e771059123660014a70de4bfa2f92be216c9c536134223d6022bc54ba51e488b73b7371bb2301b33be6311a4a81fbbf48234460dea2ded499d1a95f9354a90622154372b90bc0f722e2d05264776085a4c2829cdda81dfda3", @typed={0x8, 0x38, @ipv4=@loopback}]}, 0x16c}, {&(0x7f0000005800)={0x370, 0xffffffffffff6e40, 0x301, 0x70bd29, 0x25dfdbfc, "", [@generic="f8993f894d5aa1716824b73e6b0bd9d0ceaa0cc555fcaa6dd2bf27bea89c387b8b931339833d06b16cc5392af9ab15976994ad770aa04967e7cda964b69cb5bf4a89f400da1b85adb59bf987a49bd6f952", @nested={0x174, 0x63, [@typed={0x8, 0x12, @pid=r10}, @generic="aa5e1ce0ceb7fc6dba62ccec336667970fe4f648440d44c1c3a54adb554212efc661cad4770c047d2fb6b01c1096e8472001f47187", @generic="1cde8a6f4f56179e80fcc2ffa0aa3d47923f5d72014cca8e1e6ecdc27649d7f3a3aab522e65b28baf002023992b6f7cbdd5eec31749a3f53fcae8d7a7d1656f8712eb0060ebed8c31d83e733a1e48d1669dc8271b24e33e0d5d7a58beb4b1c8f7a3e208f3db8d3212e4d5fff5f0dc214a69b30e15f95d277c30dec9801841883f7127641eb59", @generic="4bed9f192bfdaafa29ed42f86f72add78d378dadcf02604ccf2bca8e8b65df116e4ee563fab2a99b74cdf90b321db257457f2eab2c5d8a6f3379ef7a355d3fa6fdff8e8b20186be0a38fd57e726398e2461927b2bb764af702f76e6bed5e81a0fb57bf11ff61754d7b5c10d45cbc8581611a5e2a85caba4b83265b2edf09e12bad94f4568e477fa938b1d78a573788dc7135af77124dd71cf619928f67f19bb621674901ed5a3005da0ab6"]}, @generic="74b52094c15bfe534a2d12802a919656940d4e931532b88ac7b495306441f4f0f30e9e7fa67bc528edf40bba560b83f792732980abad018e8e", @nested={0x160, 0x81, [@typed={0x90, 0x59, @binary="5d74ba0d3e8ccb432771d0fc6129aa7f3e60ee7728c89ed1deb7a829f15450ff723afdc70b2c513fd30c55e67fa0565911044856f1f4375c94f133e8cf6f6b7457d4f0c35058fe7ad66a4fc530245d4df584fe4e99380917b32ca564e09687ea379dc3dcf22ebf1b5023c102a340d652ba07e657970d7e5c8855752897e2be89f8b60d26fcf1577d4436c3"}, @generic="8e69db93", @generic="dc403748dcf0776f49453c8de1e7f9510366747f0839e9e24df8f7ff01", @generic="ac5745af1dd650b560f97f4600d580f50ccd607b8301de2f90c179de779501bf1abbc33ea7a63f047fba599270f0d09e1f51b80cba2d527ebca2d611160141ebf6f584f43238fea8e573dbdb792888e0409b9bee6dbdde802dc8c3de5a234887bca2213c989f800370", @generic="5be3d5abcaac2be848932a9ba3a284e04812a252f7776dce4d4b7676bd58297a4051a7555102fa703b8c63ca2e043deb1ae2dd5b51dc17fecd7cc5061b7e96a0a0d0"]}]}, 0x370}], 0x7, 0x0, 0x0, 0x20004081}, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r12, &(0x7f0000000180)=ANY=[], 0xfffffd56) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, 0x0, 0x0) r14 = accept4(r13, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSPASS(r12, 0x40107447, &(0x7f0000005d40)={0x7, &(0x7f00000002c0)=[{0xff, 0x2, 0x101, 0x80d}, {0x1000, 0x2ca5, 0x0, 0x4}, {0x1, 0x4, 0x7, 0xffffffffffff1f1a}, {0x1, 0x1f, 0x8b, 0x5}, {0x4, 0x6, 0x71, 0x400}, {0x4, 0x8, 0x3, 0x58fa61ab}, {0x1000, 0x7, 0x20, 0x7d32}]}) splice(r11, 0x0, r14, 0x0, 0x20000000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f0000005c40)={'team0\x00', r5}) mmap(&(0x7f0000551000/0x4000)=nil, 0x4000, 0x200000c, 0x110, r12, 0x0) [ 927.402681][ T26] audit: type=1400 audit(1552812940.969:66): avc: denied { execute } for pid=18145 comm="syz-executor.1" path="pipe:[77881]" dev="pipefs" ino=77881 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 08:55:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:41 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) gettid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) r4 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r4, 0x40, &(0x7f0000000040)={0x5, 0x7, 0x1ff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x131) r5 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r5, 0x0, 0x20000000003, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f00000000c0)) fcntl$notify(r3, 0x402, 0x80000016) 08:55:41 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)={0x5, 0xffffffff, 0x3, 0xd409, 0x1, [{0x3, 0x3, 0x2, 0x0, 0x0, 0x6}]}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x408, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40004}, 0xc0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000240)=0x7) r4 = accept4(r2, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000640)='/dev/md0\x00', 0x2000, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000700)={0x2e, 0x6, 0x0, {0x1, 0x3, 0x5, 0x0, 'syz1\x00'}}, 0x2e) setsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000000)="5322f420567a9b614b552f70a7cf2af4a4c0af85478d5f16d4d8f447984c1b2ee01f0f008079ad712ea0f45e5ff794e5ebd6340d312530141f13b46b12ee5de0369cd6cfdec5942cc7c64a5e17174205364df1e034604fa15dcc65d3c8693429e78ab1a7ca129493dc052295f276a015e232936c8b4ac1a3ae9482ad24118ec9179bba72e7faaecec98ba396eced67d0197db3d58f30324f9f9df74866229882cde09c8f462ed30a237c39b018955d884385ec3834157b2f0104b95a7888c740289562ff163f0b725a1298bcd5eeafdd0c49d29d284fcd4ed734dd18d963c3c360b86d8b", 0xe4) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000200)={0x101}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000740)={0x3, 0x0, 0xc9db, 0x101, 0x2, @stepwise={{0x4, 0x1}, {0x0, 0x8}, {0x4, 0x4}}}) fstat(r4, &(0x7f0000000440)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x80, r5, 0x200, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf61f}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x4800) [ 927.670233][T18162] EXT4-fs (sda1): re-mounted. Opts: (null) [ 927.767313][T18165] EXT4-fs (sda1): re-mounted. Opts: (null) [ 929.060333][T18178] IPVS: ftp: loaded support on port[0] = 21 [ 929.224377][T18178] chnl_net:caif_netlink_parms(): no params data found [ 929.255679][T18178] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.262861][T18178] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.270978][T18178] device bridge_slave_0 entered promiscuous mode [ 929.334668][T18178] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.346247][T18178] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.353829][T18178] device bridge_slave_1 entered promiscuous mode [ 929.429058][T18178] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 929.439277][T18178] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 929.454692][T18178] team0: Port device team_slave_0 added [ 929.462175][T18178] team0: Port device team_slave_1 added [ 929.577706][T18178] device hsr_slave_0 entered promiscuous mode [ 929.645382][T18178] device hsr_slave_1 entered promiscuous mode [ 929.758959][T18178] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.766420][T18178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 929.773917][T18178] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.781406][T18178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 929.872604][T18178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 929.883795][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 929.892476][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.901046][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.909312][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 929.919808][ T8970] device bridge_slave_1 left promiscuous mode [ 929.926758][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.986227][ T8970] device bridge_slave_0 left promiscuous mode [ 929.992422][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.607921][ T8970] device hsr_slave_1 left promiscuous mode [ 931.678151][ T8970] device hsr_slave_0 left promiscuous mode [ 931.730153][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 931.741969][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 931.753431][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 931.791549][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 931.868252][ T8970] bond0 (unregistering): Released all slaves [ 931.960925][T18178] 8021q: adding VLAN 0 to HW filter on device team0 [ 931.972615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 931.981513][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 931.989938][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.997208][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 932.015062][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 932.023742][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 932.032395][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 932.039504][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 932.047588][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 932.056289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 932.064750][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 932.073364][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 932.081696][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 932.090432][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 932.099250][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 932.108844][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 932.118089][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 932.133577][T18178] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 932.151369][T18178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 932.160069][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 932.168731][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 932.227184][T18178] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:45 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000023dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu*e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:45 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x50401) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x2, "c51878b2ab38954ad4aaa18f62c9af13dd5adb6d93d627c721158eccd1d70890", 0x1, 0x1}) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000180)={0x2, 0x4}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(xts-serpent-avx2)\x00'}, 0xfffffe54) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000552000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:55:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:45 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r0, r0, 0x9, 0xa9, &(0x7f0000000040)="37caac118f3b234b4d17143e599ea72b36b6c24fc056917c93cc306620f7eb22088e7b8b3d3ba5685f8e80c4d3d24e55a967756b468e9f2d172ceebc229045d4277737511ed47e9acfd6c3446182c5979862237cd460f7932867f67d8b6c26cd1a58a495858fbf000607377a07bbdeaf7baa949f657850916cc2baa1c3bf399c0a7a25823453f9b4253114e2a02e48fa03b62bc3510e2e713c7143f4cf1700eac83a5dd47bda4b5f9a", 0x9, 0x0, 0x9, 0x100000001, 0x8, 0x1, 0x2, 'syz0\x00'}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 932.306071][T18182] EXT4-fs (sda1): re-mounted. Opts: (null) [ 932.414499][T18192] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00006ddc", 0xa}], 0x8008, 0xffffffffffffffff) [ 932.484611][T18192] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu+e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 932.680074][T18199] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00006edc", 0xa}], 0x8008, 0xffffffffffffffff) [ 932.845496][T18199] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu-e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:46 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40090100}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x1a4, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x55}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x800, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA={0xf0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x36}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8df3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xacdf}]}]}]}, 0x1a4}}, 0x4000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) readv(r5, &(0x7f0000000280)=[{&(0x7f0000000000)=""/225, 0xe1}, {&(0x7f0000000180)=""/213, 0xd5}, {&(0x7f0000000340)=""/216, 0xd8}], 0x3) 08:55:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:46 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 933.398113][T18216] EXT4-fs (sda1): re-mounted. Opts: (null) [ 933.435953][T18223] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:47 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000eb", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000080)={0x0, 0xee3, 0x3, [], &(0x7f0000000040)=0x10000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000001c0)={@mcast2, 0x2, r6}) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000000)=0x1) 08:55:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu.e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 933.685290][T18239] EXT4-fs (sda1): re-mounted. Opts: (null) [ 933.735800][T18242] EXT4-fs (sda1): re-mounted. Opts: (null) [ 935.075939][T18253] IPVS: ftp: loaded support on port[0] = 21 [ 935.135799][T18253] chnl_net:caif_netlink_parms(): no params data found [ 935.218627][T18253] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.225900][T18253] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.234008][T18253] device bridge_slave_0 entered promiscuous mode [ 935.242034][T18253] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.249570][T18253] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.257350][T18253] device bridge_slave_1 entered promiscuous mode [ 935.331583][T18253] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 935.346374][T18253] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 935.364253][T18253] team0: Port device team_slave_0 added [ 935.372055][T18253] team0: Port device team_slave_1 added [ 935.486817][T18253] device hsr_slave_0 entered promiscuous mode [ 935.535415][T18253] device hsr_slave_1 entered promiscuous mode [ 935.659064][T18253] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.666502][T18253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.674022][T18253] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.681166][T18253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.772182][T18253] 8021q: adding VLAN 0 to HW filter on device bond0 [ 935.784020][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 935.792593][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.800397][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.808686][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 935.875541][T18253] 8021q: adding VLAN 0 to HW filter on device team0 [ 935.886752][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.895192][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.902407][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.912774][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.921350][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.928449][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.940852][ T8970] device bridge_slave_1 left promiscuous mode [ 935.948100][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.015937][ T8970] device bridge_slave_0 left promiscuous mode [ 936.022247][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.647888][ T8970] device hsr_slave_1 left promiscuous mode [ 937.718373][ T8970] device hsr_slave_0 left promiscuous mode [ 937.790063][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 937.801507][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 937.813112][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 937.870939][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 937.961322][ T8970] bond0 (unregistering): Released all slaves [ 938.076448][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 938.086457][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 938.095852][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 938.109176][T18253] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 938.119906][T18253] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 938.132127][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 938.140995][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 938.149880][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 938.158516][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 938.167505][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 938.184537][T18253] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xa000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:51 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000eb", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu0e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:51 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd(r0, &(0x7f0000000000)={0x2}, 0x8) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:51 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', '+vboxnet1securityppp1\x00'}, &(0x7f0000000080)=""/75, 0x4b) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000340)={0x0, 0x0, 0x2080}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 938.338192][T18262] EXT4-fs (sda1): re-mounted. Opts: (null) [ 938.356904][T18262] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:52 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000003c", 0xa}], 0x8008, 0xffffffffffffffff) 08:55:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuXe\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 938.612256][T18278] EXT4-fs (sda1): re-mounted. Opts: (null) [ 938.627630][T18279] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 938.703322][T18278] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:52 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x2}], 0x8008, 0xffffffffffffffff) 08:55:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuce\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:52 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xdf2a210334d9fb7e}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x204, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x4, 0xfffffffffffffffa, @l2={'ib', 0x3a, 'bond0\x00'}}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x81) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:55:52 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x3}], 0x8008, 0xffffffffffffffff) 08:55:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x10000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 939.407412][T18304] EXT4-fs (sda1): re-mounted. Opts: (null) [ 939.453714][T18307] EXT4-fs (sda1): re-mounted. Opts: (null) [ 940.836106][T18312] IPVS: ftp: loaded support on port[0] = 21 [ 940.947295][T18312] chnl_net:caif_netlink_parms(): no params data found [ 940.975985][T18312] bridge0: port 1(bridge_slave_0) entered blocking state [ 940.983216][T18312] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.991064][T18312] device bridge_slave_0 entered promiscuous mode [ 940.999190][T18312] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.006337][T18312] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.014561][T18312] device bridge_slave_1 entered promiscuous mode [ 941.032478][T18312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 941.043172][T18312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 941.115661][T18312] team0: Port device team_slave_0 added [ 941.122301][T18312] team0: Port device team_slave_1 added [ 941.186837][T18312] device hsr_slave_0 entered promiscuous mode [ 941.245614][T18312] device hsr_slave_1 entered promiscuous mode [ 941.353674][T18312] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.361292][T18312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 941.368795][T18312] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.375919][T18312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 941.470979][T18312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 941.482380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 941.490658][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.499786][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.508376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 941.575918][T18312] 8021q: adding VLAN 0 to HW filter on device team0 [ 941.586118][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 941.594448][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.601544][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 941.623031][T18312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 941.634326][T18312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 941.647765][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 941.657419][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.664707][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 941.673089][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 941.681946][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 941.690397][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 941.699019][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 941.708097][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 941.715797][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 941.790491][T18312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 941.827161][ T8970] device bridge_slave_1 left promiscuous mode [ 941.833401][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state 08:55:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(0x0, &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:55 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1e, 0x4, 0x53}) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x4}], 0x8008, 0xffffffffffffffff) 08:55:55 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd56) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) write$vnet(r1, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/178, 0xb2, &(0x7f0000000180)=""/163, 0x1, 0x3}}, 0x68) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cmac-aes-ce\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r3, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:55:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fude\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 941.883890][T18317] EXT4-fs (sda1): re-mounted. Opts: (null) [ 941.890302][ T8970] device bridge_slave_0 left promiscuous mode [ 941.896896][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.971288][T18324] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 942.034124][T18327] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x5}], 0x8008, 0xffffffffffffffff) [ 942.092856][T18327] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuie\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 942.219718][T18337] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x6}], 0x8008, 0xffffffffffffffff) [ 942.297140][T18342] EXT4-fs (sda1): re-mounted. Opts: (null) [ 942.410369][T18347] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 08:55:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fule\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x7}], 0x8008, 0xffffffffffffffff) 08:55:56 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000000)=0x1f) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 942.593661][T18359] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 944.487886][ T8970] device hsr_slave_1 left promiscuous mode [ 944.540163][ T8970] device hsr_slave_0 left promiscuous mode [ 944.590142][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 944.601751][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 944.613141][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 944.679008][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 944.767606][ T8970] bond0 (unregistering): Released all slaves 08:55:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(0x0, &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuoe\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:55:58 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x8}], 0x8008, 0xffffffffffffffff) 08:55:58 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x6, 0x688, 0x0, 0x0, 0xf0, 0x0, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x5}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@local, @rand_addr="916c2a9c4e22456ee2c06bf775d27e38", [0xffffffff, 0x0, 0xff, 0xffffff00], [0x0, 0xffffffff], 'vlan0\x00', 'ip_vti0\x00', {0xff}, {}, 0x33, 0x4, 0x0, 0x40}, 0x0, 0x138, 0x180, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @common=@dst={0x48, 'dst\x00', 0x0, {0xcc, 0x4, 0x1, [0x2, 0x7, 0x7, 0x0, 0xfffffffffffffffd, 0x7fff, 0x2631, 0x1, 0x122d, 0x1680, 0x8, 0x0, 0x1000000000000, 0x6, 0xff, 0x74], 0x5}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@empty, 0x21, 0x2d, 0x72f0}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x5fc0}}}, {{@ipv6={@mcast1, @rand_addr="8cc7dfc12c0b38415b80cb0aab838ad8", [0xffffffff, 0xff000000, 0xffffffff, 0xffffff00], [0xff0000ff, 0x0, 0x0, 0xffffffff], 'eql\x00', 'nr0\x00', {0xff}, {}, 0x5d, 0x0, 0x1, 0x20}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x0, 0x8}}, @common=@eui64={0x28, 'eui64\x00'}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x80}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 945.062399][T18377] IPVS: ftp: loaded support on port[0] = 21 [ 945.142461][T18383] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 945.175194][T18382] EXT4-fs: 3 callbacks suppressed [ 945.175208][T18382] EXT4-fs (sda1): re-mounted. Opts: (null) [ 945.197099][T18382] EXT4-fs (sda1): re-mounted. Opts: (null) [ 945.301797][T18377] chnl_net:caif_netlink_parms(): no params data found [ 945.443916][T18377] bridge0: port 1(bridge_slave_0) entered blocking state [ 945.486128][T18377] bridge0: port 1(bridge_slave_0) entered disabled state [ 945.508449][T18377] device bridge_slave_0 entered promiscuous mode [ 945.528895][T18377] bridge0: port 2(bridge_slave_1) entered blocking state [ 945.537162][T18377] bridge0: port 2(bridge_slave_1) entered disabled state [ 945.545677][T18377] device bridge_slave_1 entered promiscuous mode [ 945.568642][T18377] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 945.580184][T18377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 945.604223][T18377] team0: Port device team_slave_0 added [ 945.612708][T18377] team0: Port device team_slave_1 added [ 945.697891][T18377] device hsr_slave_0 entered promiscuous mode [ 945.735363][T18377] device hsr_slave_1 entered promiscuous mode [ 945.833858][T18377] bridge0: port 2(bridge_slave_1) entered blocking state [ 945.840980][T18377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 945.848366][T18377] bridge0: port 1(bridge_slave_0) entered blocking state [ 945.855495][T18377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 945.919673][T18377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 945.939625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 945.953892][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 945.962232][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 945.984365][T18377] 8021q: adding VLAN 0 to HW filter on device team0 [ 946.002113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 946.018580][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 946.030841][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.038041][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 946.071048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 946.079853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 946.094277][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.101389][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 946.116088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 946.132685][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 946.142601][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 946.155617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 946.165975][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 946.173811][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 946.185457][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 946.212383][T18377] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 946.228839][T18377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 946.241818][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 946.256697][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 946.265545][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 946.274822][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 946.284022][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 946.302101][T18377] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x3f000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:59 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) 08:55:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(0x0, &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:55:59 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x9}], 0x8008, 0xffffffffffffffff) [ 946.343998][T18396] EXT4-fs (sda1): re-mounted. Opts: (null) [ 946.374112][T18396] EXT4-fs (sda1): re-mounted. Opts: (null) 08:55:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fupe\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:00 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r3, r4/1000+30000}}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r6, 0x0, 0x20000000003, 0x0) [ 946.470937][T18405] EXT4-fs (sda1): re-mounted. Opts: (null) [ 946.488007][T18407] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop0 [ 946.533845][T18405] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:00 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xb}], 0x8008, 0xffffffffffffffff) 08:56:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuue\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x20000) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) futimesat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000180)='./file0\x00', 0x7fffffff, 0x5, &(0x7f0000000500)=[{&(0x7f00000001c0)="6f15e57567adddf54046407a9930bcf34c779ffb4ebc29b54466297f645b5f5b46398e09f5db8dae07d3fcd4393f4ee7336d5527ab6dd11c4c785e1e9eb313ca097d23be4d8e3c51c60099b0c12b392a90b7e00b6092ffff90fae7786f26d32953da962bbfe71167bc1fc4", 0xfeb9, 0x8000}, {&(0x7f0000000240)="a7a9bfbb93d2298e23a51236d2b0fb3a072ba90421a092104f670aaf988059da4f9cb51663ba8179453bddd695b817f283c36b609e554a0b597c60d95634195a0d08d360bbd8a6dd5a3ecec2578adfca5ca21d8d43a75ba341e27314ec963010ae7b6a5945729a9b058414c75aa46c3bd2dc7044d12b80d4ec92588b36d4f455efc6853c227f269b34397061e3cf7fdac833f73d62c2218b7623", 0x3c1, 0x100}, {&(0x7f0000000580)="5ee846da1f5dd4f757d613a0079cfb4860cfb50d9012b0188d199673f406d7", 0x1f, 0x7}, {&(0x7f0000000380)="00f1d99c337e9e21a8f2e3e7e602b2aa6592d5f715b6641ace5a46fd498b71e5aaf9786d9787eddddf239af06b68594116eca741afe7488a52b0cdccc03b495aab6ab2b8386120ecef51c677de225fc2804433551693f8323bad173740f692ad2b", 0x61, 0x1}, {&(0x7f0000000400)="d95a31c4c735f30af0b1bbc9d81c0d054cc64ec02bae13cdb2bec8c81762ed79ad97348be81bc513dc2fb9915732c1ad6020c025ca2289781b7f9a46a4e34fdd53b114108f2d2ca704bb99cdeafe7a37dcb97c3ba05daa1459b35a4e0d645b2bf609432a8dcbce2091a8375f9244f045b1402770d24fb4b2d2fd478609318c3a7865d07c6356eeca5f8e25bab654cd5e8a04fa70ce9bbcebe65dd7c41e27c23d23c90324e5622581284ce79f1a173640c79700ff5a6cd20380d102eadc8a1d12f8c49a8c3dc425a2a19d46f00d93d6a9069567011aeacdb5a17133e1cfb8dd241701", 0xe2, 0xff}], 0x40000, 0xffffffffffffffff) [ 946.757334][T18418] EXT4-fs (sda1): re-mounted. Opts: (null) [ 946.842661][T18421] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuxe\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:00 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xc}], 0x8008, 0xffffffffffffffff) 08:56:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x40000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:00 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xd}], 0x8008, 0xffffffffffffffff) [ 947.277974][T18437] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:00 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 947.395113][T18441] EXT4-fs (sda1): re-mounted. Opts: (null) [ 948.766950][T18461] IPVS: ftp: loaded support on port[0] = 21 [ 949.048277][T18461] chnl_net:caif_netlink_parms(): no params data found [ 949.073522][T18461] bridge0: port 1(bridge_slave_0) entered blocking state [ 949.081227][T18461] bridge0: port 1(bridge_slave_0) entered disabled state [ 949.089526][T18461] device bridge_slave_0 entered promiscuous mode [ 949.209154][T18461] bridge0: port 2(bridge_slave_1) entered blocking state [ 949.216781][T18461] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.224442][T18461] device bridge_slave_1 entered promiscuous mode [ 949.241668][ T8970] device bridge_slave_1 left promiscuous mode [ 949.248230][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.306254][ T8970] device bridge_slave_0 left promiscuous mode [ 949.312619][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 949.367294][ T8970] device bridge_slave_1 left promiscuous mode [ 949.373563][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.415893][ T8970] device bridge_slave_0 left promiscuous mode [ 949.422366][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 952.676877][ T8970] device hsr_slave_1 left promiscuous mode [ 952.749975][ T8970] device hsr_slave_0 left promiscuous mode [ 952.818231][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 952.832971][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 952.844247][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 952.881598][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 952.970472][ T8970] bond0 (unregistering): Released all slaves [ 953.127208][ T8970] device hsr_slave_1 left promiscuous mode [ 953.200617][ T8970] device hsr_slave_0 left promiscuous mode [ 953.259709][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 953.271178][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 953.282563][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 953.341188][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 953.414438][ T8970] bond0 (unregistering): Released all slaves [ 953.532095][T18461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 953.542497][T18461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 953.562075][T18461] team0: Port device team_slave_0 added [ 953.571688][T18461] team0: Port device team_slave_1 added [ 953.637711][T18461] device hsr_slave_0 entered promiscuous mode [ 953.695326][T18461] device hsr_slave_1 entered promiscuous mode [ 953.813535][T18461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 953.826968][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 953.834707][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 953.844944][T18461] 8021q: adding VLAN 0 to HW filter on device team0 [ 953.860490][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 953.869177][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 953.877617][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.884656][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 953.892267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 953.901215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 953.909702][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.916793][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 953.924674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 953.935984][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 953.936598][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 953.966793][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 953.975775][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 953.984201][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 953.993130][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 954.001684][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 954.011444][T18461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 954.034699][T18461] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x48000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xe}], 0x8008, 0xffffffffffffffff) 08:56:07 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fus\n\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:07 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) fcntl$setpipe(r2, 0x407, 0x80000000) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) gettid() r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000040)={r5}) [ 954.127382][T18469] EXT4-fs (sda1): re-mounted. Opts: (null) [ 954.223408][T18477] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xf}], 0x8008, 0xffffffffffffffff) [ 954.316450][T18481] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fus%\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:08 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000080)=r4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r6, 0x0, 0x20000000003, 0x0) 08:56:08 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x10}], 0x8008, 0xffffffffffffffff) [ 954.563136][T18492] EXT4-fs (sda1): re-mounted. Opts: (null) [ 954.643413][T18492] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x02', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:08 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x11}], 0x8008, 0xffffffffffffffff) 08:56:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 955.157345][T18512] EXT4-fs (sda1): re-mounted. Opts: (null) [ 955.225701][T18512] EXT4-fs (sda1): re-mounted. Opts: (null) [ 956.583974][T18521] IPVS: ftp: loaded support on port[0] = 21 [ 956.703622][T18521] chnl_net:caif_netlink_parms(): no params data found [ 956.789706][T18521] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.797354][T18521] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.805473][T18521] device bridge_slave_0 entered promiscuous mode [ 956.813761][T18521] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.821109][T18521] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.828897][T18521] device bridge_slave_1 entered promiscuous mode [ 956.903052][T18521] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 956.913194][T18521] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 956.929799][T18521] team0: Port device team_slave_0 added [ 956.937015][T18521] team0: Port device team_slave_1 added [ 957.038131][T18521] device hsr_slave_0 entered promiscuous mode [ 957.075354][T18521] device hsr_slave_1 entered promiscuous mode [ 957.177797][T18521] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.185131][T18521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.192413][T18521] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.199545][T18521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.231309][T18521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 957.302222][T18521] 8021q: adding VLAN 0 to HW filter on device team0 [ 957.309971][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 957.317991][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 957.326306][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.334494][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 957.352876][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 957.361918][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.369203][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.377583][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 957.386575][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.393884][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.466542][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 957.475749][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 957.493391][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 957.502291][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 957.511265][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 957.521960][T18521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 957.597650][T18521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 957.636200][ T8970] device bridge_slave_1 left promiscuous mode [ 957.642434][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state 08:56:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4c000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x319) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:11 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x47, 0x800) accept4(r0, 0x0, &(0x7f00000002c0), 0x80000) r1 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000580)={0x3, 0x0, [{0x4, 0x42, &(0x7f0000000400)=""/66}, {0x5000, 0x0, &(0x7f0000000480)}, {0x6000, 0x98, &(0x7f00000004c0)=""/152}]}) syz_emit_ethernet(0x2a, &(0x7f0000000380)={@broadcast, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x3, @broadcast, @loopback, @local, @multicast1}}}}, &(0x7f00000003c0)={0x0, 0x4, [0x11e, 0x25b, 0x6b9, 0x377]}) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0xfffffc67) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f00000001c0)={0x4, 0x8a, "bda343d662b75fc3fdbbefa961367dc956930581bb07865bb37da88e2ea5e47f44a9cd42a5a9da172bff409df9e700e00a2a1539bfb0596818fd85c4759a6e9c82584a879ec5ffedd83c1f610c46c42edb048513621940a42a6ef1e2ce04f1fc83809a7868e53dfc20f154e11ffc33e3ae36977d023ba8e457f4ff0a01b323644ef255eead17c02c8ec1"}) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f0000000180)=0xc3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000340)=""/41) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000000)={0x2, 0x10000}) splice(r2, 0x0, r6, 0x0, 0x20000000003, 0x0) 08:56:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x03', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x12}], 0x8008, 0xffffffffffffffff) 08:56:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 957.676683][ T8970] device bridge_slave_0 left promiscuous mode [ 957.682957][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state 08:56:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x13}], 0x8008, 0xffffffffffffffff) [ 957.790176][T18535] EXT4-fs (sda1): re-mounted. Opts: (null) [ 957.840989][T18535] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x04', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x14}], 0x8008, 0xffffffffffffffff) [ 958.032279][T18546] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x05', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x06', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x15}], 0x8008, 0xffffffffffffffff) [ 960.156817][ T8970] device hsr_slave_1 left promiscuous mode [ 960.230159][ T8970] device hsr_slave_0 left promiscuous mode [ 960.289857][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 960.311877][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 960.323616][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 960.359350][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 960.448149][ T8970] bond0 (unregistering): Released all slaves 08:56:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x60000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\a', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:14 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x16}], 0x8008, 0xffffffffffffffff) 08:56:14 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x3, 0x71, "939a7854637f02d8f2b9f5a56a2eee66a08d7a8e5c581095c46a2a17764d5c57fcfda5a357db44e47084259096339404990fcaf8744d597e4ed2e43165b08067b160125083c3f90d17ef37da3f1e3df3c2d2eecba6e3ac86a18c5ea06bd4c3d85e5ee7067466e9dfdd1b8aa58c047f6f75"}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x30001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0xfffffe65) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = semget(0x1, 0x7, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000240)=0xe8) r7 = getgid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f00000004c0)={{0x8001, r6, r7, r8, r9, 0x6, 0x3}, 0x80000000, 0x8, 0x7}) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:14 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 960.600096][T18580] IPVS: ftp: loaded support on port[0] = 21 [ 960.755307][T18593] EXT4-fs: 5 callbacks suppressed [ 960.755318][T18593] EXT4-fs (sda1): re-mounted. Opts: (null) [ 960.870503][T18586] EXT4-fs (sda1): re-mounted. Opts: (null) [ 960.923831][T18580] chnl_net:caif_netlink_parms(): no params data found [ 961.051722][T18580] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.075256][T18580] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.091243][T18580] device bridge_slave_0 entered promiscuous mode [ 961.105968][T18580] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.113164][T18580] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.127349][T18580] device bridge_slave_1 entered promiscuous mode [ 961.159825][T18580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 961.170222][T18580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 961.191499][T18580] team0: Port device team_slave_0 added [ 961.199762][T18580] team0: Port device team_slave_1 added [ 961.267628][T18580] device hsr_slave_0 entered promiscuous mode [ 961.305361][T18580] device hsr_slave_1 entered promiscuous mode [ 961.363528][T18580] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.370644][T18580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 961.378224][T18580] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.385301][T18580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 961.452846][T18580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 961.474005][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 961.500181][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.511681][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.538746][T18580] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.561547][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 961.577443][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 961.591571][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.598719][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 961.635387][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 961.662804][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 961.677794][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.685094][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 961.698760][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 961.723232][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 961.735386][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 961.744196][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 961.759142][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 961.770686][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 961.785197][T18580] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 961.796661][T18580] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 961.808929][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 961.817886][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 961.835627][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 961.843984][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 961.852932][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 961.861710][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 961.883953][T18580] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 08:56:15 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x17}], 0x8008, 0xffffffffffffffff) 08:56:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x68000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in6, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) r4 = getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000640)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) r7 = getegid() r8 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0xc) r10 = getuid() r11 = getgid() sendmsg$unix(r1, &(0x7f0000000a00)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000080)="0afe0ae1eedf0c33020d866e741007", 0xf}, {&(0x7f00000000c0)="34efa5bd3243e430f0da1ba9a0f17d1ed6042e4ae7f981875e816a7ad8a0c7d8db1cd2fbeb1b88273a9825", 0x2b}, {&(0x7f0000000180)="153e1271e92eec6166f5851b29654571782edccc0cf4f18a9ece897444e2ac2a3c80cbd7b04addcb3fbb1c902039c32c150b2d280a83799e6558225ce47426907c07eb271e9ca19ecf2f2f4041a36cbe9bddaf0b525f9ac6d7bb44eb0f93c908a77189d91cd5074189ab12c9d6411ada556f51ad1e09a1c5436ba1b4eed952a6a9f019403fc83e254c4543c033d20a15f627f49b057a2f213f215caa26a4c17f7174", 0xa2}, {&(0x7f0000000340)="c1638a175bbb8e8f3ddd8851b705bcef2b10e7eab73d527bcf92d16e671799d10cc24efcf808813eae12cdba4c6171bfdf8fede88dcb29b14b73bfcdb828efde4f1f68c0ae8684df9c64a778d8d154acbd788ddd01cb084fac20827adf04db5c70f4d21b693164ad5e35b3fc7d5610f6ada386cf0377dd66b0030b71650718eb6d00374fcda98ef95745c66be0aa39c99318e2bc3c3f9d2a99a2a969112c1e7deca275d2480659f361776239615fdf27289e54c1337d22953050837fc86b71104993537fb9f6b42eb5f4f8819a45527a45d86a8c942095668d221c79161161c2bd1734cdce", 0xe5}, {&(0x7f0000000440)="90025ad092b1154f7a5ae885c1115595cc88fde74b60732d267f3f22133293004e254a3f249e063d587c3876ef8e74592620b82d4561f7d4f20e900554257f462fee533391b0006ebe540ece9d46f995c9d60a75506c4ff6aec804682b554ef197c374bd1d88b98176ff15063f92c7e599bf91e2e0033daf7964a8eb634aa426a69858c9740590e82accf9575b1e384fd56e3fb2065e45f002e1a6945571eced6d1ff836a655add61db1e5683fa7c5379949c2e441e4d983b08c9a691bbda91803396a82452dff1968072b9d0de1", 0xce}], 0x5, &(0x7f0000000880)=[@rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @rights={0x20, 0x1, 0x1, [r1, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r1, r1, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x28, 0x1, 0x1, [r8, r0, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x150, 0x20004001}, 0x20000000) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r13, &(0x7f0000000180)=ANY=[], 0xfffffd56) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r14, 0x117, 0x1, 0x0, 0x0) r15 = accept4(r14, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r12, 0x0, r15, 0x0, 0x20000000003, 0x0) 08:56:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\b', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:15 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 961.946763][T18604] EXT4-fs (sda1): re-mounted. Opts: (null) [ 962.062093][T18611] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:15 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x6d}], 0x8008, 0xffffffffffffffff) [ 962.182200][T18617] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x10', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xeb}], 0x8008, 0xffffffffffffffff) [ 962.545647][T18626] EXT4-fs (sda1): re-mounted. Opts: (null) [ 962.601803][T18627] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuseH', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:16 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) accept$netrom(r3, &(0x7f0000000000)={{0x3, @netrom}, [@remote, @rose, @null, @rose, @null, @bcast, @default, @default]}, &(0x7f0000000080)=0x48) 08:56:16 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000552000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x1dff, 0x1f, 0x7ff, 0xcfd, 0x0, 0x1f, 0x2, 0x0, 0x8, 0x5, 0x4, 0x7ff, 0xfffffffffff7fff9, 0xfe, 0x3, 0x520d, 0x47, 0xffffffff, 0xffffc00000000000, 0x0, 0x9, 0x8, 0xfffffffffffffc00, 0x3bf00000000000, 0x80000001, 0xd444, 0x3, 0x3, 0x9, 0x8, 0x5, 0x1, 0x6, 0x7ff, 0xbb9, 0x8001, 0x0, 0xfff, 0x1, @perf_config_ext={0x9, 0x9}, 0x8284, 0x5, 0xffffffff, 0xe, 0x8000, 0xe01e, 0x200}, r4, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') [ 963.166176][T18648] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:16 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 963.230678][T18648] EXT4-fs (sda1): re-mounted. Opts: (null) [ 964.488623][T18663] IPVS: ftp: loaded support on port[0] = 21 [ 964.778047][T18663] chnl_net:caif_netlink_parms(): no params data found [ 964.804707][T18663] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.812130][T18663] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.820594][T18663] device bridge_slave_0 entered promiscuous mode [ 964.828731][T18663] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.835979][T18663] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.843850][T18663] device bridge_slave_1 entered promiscuous mode [ 964.977802][T18663] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 964.988573][T18663] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 965.004523][T18663] team0: Port device team_slave_0 added [ 965.012503][T18663] team0: Port device team_slave_1 added [ 965.176958][T18663] device hsr_slave_0 entered promiscuous mode [ 965.215380][T18663] device hsr_slave_1 entered promiscuous mode [ 965.266373][ T8970] device bridge_slave_1 left promiscuous mode [ 965.272697][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.326187][ T8970] device bridge_slave_0 left promiscuous mode [ 965.332462][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.387186][ T8970] device bridge_slave_1 left promiscuous mode [ 965.393423][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.447165][ T8970] device bridge_slave_0 left promiscuous mode [ 965.453409][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.728209][ T8970] device hsr_slave_1 left promiscuous mode [ 968.798293][ T8970] device hsr_slave_0 left promiscuous mode [ 968.849945][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 968.861474][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 968.872687][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 968.909292][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 969.010644][ T8970] bond0 (unregistering): Released all slaves [ 969.159097][ T8970] device hsr_slave_1 left promiscuous mode [ 969.208321][ T8970] device hsr_slave_0 left promiscuous mode [ 969.261086][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 969.273055][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 969.285194][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 969.349212][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 969.417570][ T8970] bond0 (unregistering): Released all slaves [ 969.540313][T18663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 969.553509][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 969.561872][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 969.573591][T18663] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.583152][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 969.583579][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 969.599763][ T1042] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.606860][ T1042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 969.622065][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 969.630098][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 969.639515][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 969.647918][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.655119][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 969.663034][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 969.671655][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 969.695571][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 969.704128][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 969.713201][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 969.722324][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 969.731024][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 969.739335][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 969.747602][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 969.756014][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 969.765266][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 969.777746][T18663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 969.796050][T18663] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6c000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x427}], 0x8008, 0xffffffffffffffff) 08:56:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 08:56:23 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuseL', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:23 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xffffffffffffff4b) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r0, 0x401, 0x6, r2}) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x1) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x428}], 0x8008, 0xffffffffffffffff) [ 970.032931][T18683] EXT4-fs (sda1): re-mounted. Opts: (null) [ 970.071290][T18683] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse`', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x438}], 0x8008, 0xffffffffffffffff) [ 970.327801][T18693] EXT4-fs (sda1): re-mounted. Opts: (null) [ 970.370483][T18693] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuseh', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:24 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x2600}], 0x8008, 0xffffffffffffffff) 08:56:24 executing program 1: munmap(&(0x7f000055a000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000001c0)={0xf2, 0x3, 0x1}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x59, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x87c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, r4, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) r5 = semget$private(0x0, 0x3, 0x202) semctl$GETNCNT(r5, 0x0, 0xe, &(0x7f0000000000)=""/218) 08:56:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x74000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:24 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='veth0_to_bond\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 971.059234][T18716] EXT4-fs (sda1): re-mounted. Opts: (null) [ 971.111727][T18716] EXT4-fs (sda1): re-mounted. Opts: (null) [ 972.371121][T18732] IPVS: ftp: loaded support on port[0] = 21 [ 972.596035][T18732] chnl_net:caif_netlink_parms(): no params data found [ 972.624510][T18732] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.632346][T18732] bridge0: port 1(bridge_slave_0) entered disabled state [ 972.640197][T18732] device bridge_slave_0 entered promiscuous mode [ 972.704884][T18732] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.712161][T18732] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.722766][T18732] device bridge_slave_1 entered promiscuous mode [ 972.794171][T18732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 972.804908][T18732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 972.823398][T18732] team0: Port device team_slave_0 added [ 972.830848][T18732] team0: Port device team_slave_1 added [ 972.947762][T18732] device hsr_slave_0 entered promiscuous mode [ 972.985491][T18732] device hsr_slave_1 entered promiscuous mode [ 973.108114][T18732] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.115215][T18732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.122818][T18732] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.130249][T18732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.220802][T18732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 973.233869][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 973.242464][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.250839][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.260100][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 973.329056][T18732] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.341194][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.349707][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.356913][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.440230][T18732] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 973.451342][T18732] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 973.464067][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.473130][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.480230][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.488891][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 973.498351][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 973.506847][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 973.515427][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 973.523959][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 973.531856][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 973.540574][ T8970] device bridge_slave_1 left promiscuous mode [ 973.547176][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.596215][ T8970] device bridge_slave_0 left promiscuous mode [ 973.602524][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.206976][ T8970] device hsr_slave_1 left promiscuous mode [ 975.288461][ T8970] device hsr_slave_0 left promiscuous mode [ 975.340164][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 975.351541][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 975.363462][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 975.429058][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 975.516966][ T8970] bond0 (unregistering): Released all slaves [ 975.629606][T18732] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) 08:56:29 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xff0f}], 0x8008, 0xffffffffffffffff) 08:56:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fusel', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:29 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000000c0)={0xa3, &(0x7f0000000000)="6efc44fe472d7f51448d7f830667220fad3d0b2c7a00736f198bc0229427cd84cb7d732ca0818bee20597bc2cf90e19880b311d51df50b9d12ae8042529444155d238a1fcada4ae9b4540d9424c7569c5b5901bb5d43b8003008dbf2f022bd3a3caa2b496774bda759b5864321f09c130e113b9b5b87b3191b170458e5e5d2a7aad59b2d5e6af84cc8148d5491aab4bc5e35a3f601a60d8843da33a424fe8e435845d9"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7a000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 975.716553][T18737] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:29 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x9, 0x2, 0x9000}, 0x4) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x1, 0xc91}) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000340)={0x3, &(0x7f00000002c0)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000380)={r4, 0x23}) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r3, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000000)='hash\x00'}, 0x30) ptrace$getregset(0x4204, r6, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=""/192, 0xc0}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000003c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x1a}, 0x1, 0x7, [@broadcast, @remote, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2, @dev={0xac, 0x14, 0x14, 0x21}]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r5, 0x0, 0x20000000003, 0x0) [ 975.850747][T18749] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:29 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x407ff}], 0x8008, 0xffffffffffffffff) [ 975.891036][T18750] EXT4-fs (sda1): re-mounted. Opts: (null) [ 975.941378][T18749] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) 08:56:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuset', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:29 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000080)=0xbb42, 0x4) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/load\x00', 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYRESHEX=r1, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESHEX=r1], @ANYRESDEC=r1, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRES16=r1, @ANYRES32=r2, @ANYBLOB="e73198a6fe9a1eb7b1cc5b578923069aea888fc8d77766f7203028b913d59c51fa9a54e9dfd2c0e061f846d4c2ca0cc3a7109eabc264ceb6bb612c2a08532d8e726803d49346d6fab2c08b8e084824eab6e62614280a5cc48f5488d671fea5757cda804709d73d7b29bd658398709ca40c47573addae94eb59d31f821bdca007a13eb6452e26746c4703000d0f7e9eafca8551075ef7989186869a20edbc4f7c45ff53b8f06da0d85d1a54273e8cd9cbb4b5f21539d90169663e5b22ffa7022aee9fff887807eefbad9f5c5c064363eb08"], @ANYBLOB="fef016432147759bb2e0a874836a7dde46f94724080b0334fee2ddea7e226db455090c2f30f64ab298fbdb3a81d15457d0306fea9a13c0558b5fdedfe2cd446c9305f559a3ba034478ae06ac3133e91d7d4a356db939d28c53da1920e1de1e58cb54794b07396ef24b7d440e457594bcdb4e1e486a", @ANYBLOB="48f7abfb276520bb7e792485914d218a028a6faa839255dbafd259bb8bf2c95c68683d967a21b5715daed7c0c8d23d18d2235370df7bdd7bce6409a649fc421bc71a24ce86f28344c5b12cdb8e56b03d193bf99e23399fddc8818cc05e"], 0xfffffc47) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) accept$nfc_llcp(r1, 0x0, &(0x7f0000000280)) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 976.191062][T18765] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:29 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x40800}], 0x8008, 0xffffffffffffffff) [ 976.258523][T18767] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200), 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) [ 976.334643][T18773] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fusez', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:30 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x7ffff}], 0x8008, 0xffffffffffffffff) [ 976.612762][T18783] EXT4-fs (sda1): re-mounted. Opts: (null) [ 976.662661][T18785] EXT4-fs (sda1): re-mounted. Opts: (null) [ 976.792813][T18785] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:30 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2}], 0x8008, 0xffffffffffffffff) 08:56:30 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) r5 = msgget$private(0x0, 0x100) msgctl$IPC_RMID(r5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r6 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000180)) splice(r2, 0x0, r6, 0x0, 0x20000000003, 0x0) [ 978.440476][T18815] IPVS: ftp: loaded support on port[0] = 21 [ 978.506091][T18815] chnl_net:caif_netlink_parms(): no params data found [ 978.537034][T18815] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.544343][T18815] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.554521][T18815] device bridge_slave_0 entered promiscuous mode [ 978.562899][T18815] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.570341][T18815] bridge0: port 2(bridge_slave_1) entered disabled state [ 978.578207][T18815] device bridge_slave_1 entered promiscuous mode [ 978.594799][T18815] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 978.605322][T18815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 978.621027][T18815] team0: Port device team_slave_0 added [ 978.628304][T18815] team0: Port device team_slave_1 added [ 978.696824][T18815] device hsr_slave_0 entered promiscuous mode [ 978.745478][T18815] device hsr_slave_1 entered promiscuous mode [ 978.815706][T18815] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.822936][T18815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 978.830411][T18815] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.837636][T18815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 978.873286][T18815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 978.890110][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 978.899006][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.907481][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 978.915914][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 978.929068][T18815] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.939251][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 978.948793][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.956167][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 978.976793][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 978.985414][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.992658][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.001383][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 979.010891][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 979.021153][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 979.034046][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 979.047674][T18815] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 979.059278][T18815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 979.067545][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 979.112270][T18815] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x8cffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xc0', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:32 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendto(r2, &(0x7f0000000000)="a1", 0x1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) 08:56:32 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000000)={@void, @val={0x1, 0x4, 0x9, 0x1aff40, 0x0, 0x40}, @ipv4={{0x8, 0x4, 0x60000000000, 0x6, 0x42, 0x67, 0x6, 0x0, 0x5c, 0x0, @empty, @empty, {[@timestamp={0x44, 0x8, 0xac, 0x0, 0x3, [{[], 0x9}]}, @lsrr={0x83, 0x3, 0x4}]}}, @tipc=@payload_direct={{{{0x22, 0x0, 0x10a6, 0x3, 0xfffffffffffffff9, 0x8, 0x3, 0x2, 0x9, 0x0, 0x2, 0x7, 0x3, 0x3, 0x80000000, 0x6, 0x4, 0x4e24, 0x4e21}, 0x3, 0x2}}, [0x0, 0x0]}}}, 0x4c) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:32 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3}], 0x8008, 0xffffffffffffffff) 08:56:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sync_file_range(r0, 0xffff, 0x2, 0x4) r1 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="b078d555d1ec8bfb7f9fb10ed58fc111b2bca66f756b324dcc37ad90219ccad3ef524f511596163c9d56e0493b6f6e9566625f4cb2ba054ad14e15992640da2f66918cac544dd1b358d3552a29f175f395b7fff3f4b0fc256f9b43631837d92b5348d7b4bf8cd6fc57860c6e75f3c65a27a0392147573f9adb269b302fae5157b30396bcb1c9334a7863353c703bd161c2b06e01f304008cd97c063f19c96d22aabc42b9e47e587f546d63beb543e57ad34012b13b65f07d2a5167e59b1d29b3f4a35278055a574c0d2702d5e5e2f53575f2ff8dc99935d99f4d0339ded6090a6c9e4e1c6b00583020aecaf1", @ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="9cf541f19fdb48e18512c3d0891a23dade7343d77c8d60d549cc9816a0a1de9824fd146bac5eccfa22bcdb", @ANYRES64=r0], @ANYBLOB="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", @ANYRES32=r3, @ANYPTR64, @ANYRESOCT, @ANYRES32=r0, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYBLOB="a5ab9f9bcb0983faf92ac9c8453b245f7614a4a12008389d3b46b189e16712adea6b7eb4106b5c139fcc14", @ANYBLOB="c8eaf605baa6b71182847b9a59bbeb894a3f84f97b113b2ac2f2a5d8ecdd4c729c3e88e8fe79bc670fc4bca719167e9957ae4737a8d2689a555039681cd787f1b114e3c0f24ad9a31d2114686ad4610b297220681edd6e8473d806a61ffb7c19637d14a3cca3d2f2e6f0a317e5a302", @ANYRESHEX=r0, @ANYRES64=r2, @ANYRES64=r1, @ANYRESHEX, @ANYRESOCT=r4]], @ANYRESDEC=r0, @ANYRES16=r3, @ANYBLOB="45588ccbcebde2f475c0b8f879adcba432617f0177fb8f110375a1d0b9212789441b436e8c"], 0x43) r5 = socket$alg(0x26, 0x5, 0x0) fcntl$setpipe(r5, 0x407, 0x200000000000000) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r3, 0x0, r6, 0x0, 0x20000000003, 0x0) 08:56:32 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x87011}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0xd0f6f01d3e07303f, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9d9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffff13fd}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffe}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000085) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) connect$bt_l2cap(r0, &(0x7f0000000280)={0x1f, 0xfff, {0x0, 0x7ff, 0x7f, 0x5, 0x6, 0x435}, 0x1, 0xffffffff00000001}, 0xe) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) recvfrom(r3, &(0x7f0000000000)=""/154, 0x9a, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:56:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xf0', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:32 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x4}], 0x8008, 0xffffffffffffffff) 08:56:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x5}], 0x8008, 0xffffffffffffffff) 08:56:33 executing program 1: munmap(&(0x7f0000551000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xc0ed0000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:33 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@acquire_done], 0x0, 0x0, 0x0}) 08:56:33 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6}], 0x8008, 0xffffffffffffffff) 08:56:33 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x2) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r2, 0x800}, 0x8) ioctl$FICLONE(r1, 0x40049409, r0) r3 = socket$alg(0x26, 0x5, 0x0) fcntl$setsig(r0, 0xa, 0x1e) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffded) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2000, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf5ffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 980.219419][T18894] binder: 18893:18894 BC_ACQUIRE_DONE u0000000000000000 no match 08:56:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x7}], 0x8008, 0xffffffffffffffff) 08:56:33 executing program 2: socket$key(0xf, 0x3, 0x2) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x1000000000}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 08:56:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x8}], 0x8008, 0xffffffffffffffff) 08:56:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:34 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x8) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000040)={0xf980000, 0x11, 0x0, [], &(0x7f0000000000)={0x92225933a704c55f, 0x7f, [], @value=0xff}}) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:34 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x9}], 0x8008, 0xffffffffffffffff) 08:56:34 executing program 2: syz_emit_ethernet(0xc1, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4032, 0x0, @local, @dev}}}}}}, 0x0) [ 980.743127][T18925] EXT4-fs: 12 callbacks suppressed [ 980.743155][T18925] EXT4-fs (sda1): re-mounted. Opts: (null) [ 980.804117][T18929] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000900)=""/4096, 0xffffffffffffff78, 0x0, 0x0, 0x1c4) 08:56:34 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x1, 0x0, 0x10001, 0x13e27078}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x6, r3}) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000000)={&(0x7f0000552000/0x2000)=nil, 0x6, 0x4, 0x16, &(0x7f0000551000/0x1000)=nil, 0x8}) [ 982.096761][ T8970] device bridge_slave_1 left promiscuous mode [ 982.103002][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.156356][ T8970] device bridge_slave_0 left promiscuous mode [ 982.162583][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.818157][ T8970] device hsr_slave_1 left promiscuous mode [ 983.890326][ T8970] device hsr_slave_0 left promiscuous mode [ 983.948868][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 983.961258][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 983.972509][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 984.029140][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 984.121661][ T8970] bond0 (unregistering): Released all slaves [ 984.214544][T18958] IPVS: ftp: loaded support on port[0] = 21 [ 984.280330][T18958] chnl_net:caif_netlink_parms(): no params data found [ 984.321619][T18958] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.329361][T18958] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.337432][T18958] device bridge_slave_0 entered promiscuous mode [ 984.345282][T18958] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.352398][T18958] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.360489][T18958] device bridge_slave_1 entered promiscuous mode [ 984.377642][T18958] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 984.388050][T18958] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 984.407449][T18958] team0: Port device team_slave_0 added [ 984.414286][T18958] team0: Port device team_slave_1 added [ 984.466748][T18958] device hsr_slave_0 entered promiscuous mode [ 984.515456][T18958] device hsr_slave_1 entered promiscuous mode [ 984.623636][T18958] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.630898][T18958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 984.638722][T18958] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.646036][T18958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 984.678615][T18958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 984.691541][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 984.700556][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.708799][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.723806][T18958] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.735883][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 984.744482][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.751601][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 984.777354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 984.786759][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.794027][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 984.802735][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 984.812650][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 984.828447][T18958] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 984.839297][T18958] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 984.852897][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 984.861659][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 984.870773][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 984.902069][T18958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 984.909908][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:56:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf6ffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:38 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xa}], 0x8008, 0xffffffffffffffff) 08:56:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x9) r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 08:56:38 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000000)={0x1000, &(0x7f0000000340)="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"}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x7, 0x20, 0x80000000, 0x9, 0x4}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0xfffffffffffffffc, 0x100}, 0xc) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000200)={0x14, 0x11, 0x1, {0x8, 0x1, 0x8}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:56:38 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1624c018}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, r1, 0x401, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x13, 0x3, @l2={'ib', 0x3a, 'bridge_slave_0\x00'}}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40800}, 0x8010) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) [ 985.138362][T18968] EXT4-fs (sda1): re-mounted. Opts: (null) [ 985.172961][T18968] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:38 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xb}], 0x8008, 0xffffffffffffffff) [ 985.463580][T18988] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:39 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xd}], 0x8008, 0xffffffffffffffff) [ 985.506008][T18990] EXT4-fs (sda1): re-mounted. Opts: (null) [ 985.552505][T18992] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xf0', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 985.713174][T18998] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf8f73f00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fusez', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:39 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10000) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:39 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xe}], 0x8008, 0xffffffffffffffff) [ 986.298448][T19024] EXT4-fs (sda1): re-mounted. Opts: (null) [ 986.335250][T19018] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xff0f0000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 986.357832][T19019] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x10}], 0x8008, 0xffffffffffffffff) 08:56:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fusez', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 986.652325][T19035] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x12}], 0x8008, 0xffffffffffffffff) [ 986.714799][T19037] EXT4-fs (sda1): re-mounted. Opts: (null) [ 986.767227][T19040] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:40 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0x16}], 0x8008, 0xffffffffffffffff) 08:56:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x14}], 0x8008, 0xffffffffffffffff) 08:56:40 executing program 1: munmap(&(0x7f0000552000/0x1000)=nil, 0x1000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:40 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x8, 0x2, 0x5, 0x10001}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 987.106854][T19056] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:40 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x23}], 0x8008, 0xffffffffffffffff) 08:56:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fule\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 987.183373][T19066] EXT4-fs (sda1): re-mounted. Opts: (null) [ 987.455213][T19080] EXT4-fs (sda1): re-mounted. Opts: (null) [ 989.046183][T19087] IPVS: ftp: loaded support on port[0] = 21 [ 989.158750][T19087] chnl_net:caif_netlink_parms(): no params data found [ 989.172795][ T8970] device bridge_slave_1 left promiscuous mode [ 989.180370][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.236206][ T8970] device bridge_slave_0 left promiscuous mode [ 989.242406][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.917064][ T8970] device hsr_slave_1 left promiscuous mode [ 990.970110][ T8970] device hsr_slave_0 left promiscuous mode [ 991.029923][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 991.041460][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 991.052571][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 991.089236][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 991.161639][ T8970] bond0 (unregistering): Released all slaves [ 991.284555][T19087] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.291810][T19087] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.299836][T19087] device bridge_slave_0 entered promiscuous mode [ 991.308148][T19087] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.315357][T19087] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.323031][T19087] device bridge_slave_1 entered promiscuous mode [ 991.339191][T19087] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 991.349091][T19087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 991.367280][T19087] team0: Port device team_slave_0 added [ 991.374215][T19087] team0: Port device team_slave_1 added [ 991.427864][T19087] device hsr_slave_0 entered promiscuous mode [ 991.465353][T19087] device hsr_slave_1 entered promiscuous mode [ 991.523676][T19087] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.530926][T19087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.538261][T19087] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.545668][T19087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.578215][T19087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 991.592742][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.600872][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.610234][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 991.619551][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 991.627467][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 991.677840][T19087] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.693174][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 991.701979][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.709425][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.727825][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 991.736624][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.743860][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.756584][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 991.776285][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 991.784612][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 991.793686][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 991.808761][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 991.822116][T19087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 991.844262][T19087] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xfffff000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:45 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x26}], 0x8008, 0xffffffffffffffff) 08:56:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:45 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) fcntl$lock(r4, 0x25, &(0x7f0000000040)={0x3, 0x0, 0x9, 0x7fff, r5}) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 992.026074][T19103] EXT4-fs (sda1): re-mounted. Opts: (null) [ 992.050498][T19101] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:45 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x60}], 0x8008, 0xffffffffffffffff) [ 992.088408][T19103] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 992.315478][T19118] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:45 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6d}], 0x8008, 0xffffffffffffffff) 08:56:45 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 992.389909][T19118] EXT4-fs (sda1): re-mounted. Opts: (null) [ 992.435839][T19119] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xffffff8c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:46 executing program 2: 08:56:46 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x94, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb56e}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x24004040) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000003c0), &(0x7f0000000400)=0x8) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x5, 0x240) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x6, "127cc1ff3552"}, &(0x7f00000002c0)=0xe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r3, 0x7}, 0x8) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000000)=0x1000) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:56:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6e}], 0x8008, 0xffffffffffffffff) 08:56:46 executing program 2: [ 993.162948][T19145] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:46 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xdc}], 0x8008, 0xffffffffffffffff) [ 993.224556][T19145] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xfffffff5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:46 executing program 2: 08:56:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:46 executing program 1: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0xa62d5b91eb4247f0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000080)) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:47 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd56) r1 = socket$alg(0x26, 0x5, 0x0) r2 = getuid() ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000000c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) r3 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000180)="9024b879e934da8eeac63722ef9ee33f3b40569864dbd12e183f8911a8ae838e38fd34b668e456841ff8896f8f26d2f1c9adffba5d92af50d10d2ce361fef581bbd113d0e9cf394a51abbced245784dd1120bad33d97c66a30e5b6f6db8cdbb2bc25312a4b2b0b34ecb5713317bbf5e5a14946d25a2bb1ecb51f88451a6ed43d151bbcc0ee831db0b1f170f874a1a509c784ffe89d512f3cb4377ac0e092862b56", 0xa1, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r1, 0x0, 0x0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:47 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x300}], 0x8008, 0xffffffffffffffff) 08:56:47 executing program 2: [ 993.511678][T19165] EXT4-fs (sda1): re-mounted. Opts: (null) [ 993.550287][T19165] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:47 executing program 2: 08:56:47 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0x10) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:47 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x428}], 0x8008, 0xffffffffffffffff) 08:56:47 executing program 2: [ 995.859472][T19212] IPVS: ftp: loaded support on port[0] = 21 [ 995.982710][T19212] chnl_net:caif_netlink_parms(): no params data found [ 996.009561][T19212] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.017164][T19212] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.025166][T19212] device bridge_slave_0 entered promiscuous mode [ 996.090271][T19212] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.098221][T19212] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.106725][T19212] device bridge_slave_1 entered promiscuous mode [ 996.182025][T19212] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 996.192629][T19212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 996.268372][T19212] team0: Port device team_slave_0 added [ 996.275383][T19212] team0: Port device team_slave_1 added [ 996.326803][T19212] device hsr_slave_0 entered promiscuous mode [ 996.365456][T19212] device hsr_slave_1 entered promiscuous mode [ 996.482827][T19212] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.490256][T19212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 996.498951][T19212] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.506127][T19212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 996.541895][T19212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 996.553797][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 996.564092][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.572436][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.580613][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 996.590877][ T8970] device bridge_slave_1 left promiscuous mode [ 996.597732][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.646274][ T8970] device bridge_slave_0 left promiscuous mode [ 996.652475][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.370932][ T8970] device hsr_slave_1 left promiscuous mode [ 998.418579][ T8970] device hsr_slave_0 left promiscuous mode [ 998.460688][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 998.473170][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 998.486563][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 998.530227][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 998.602273][ T8970] bond0 (unregistering): Released all slaves [ 998.711517][T19212] 8021q: adding VLAN 0 to HW filter on device team0 [ 998.724041][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 998.733066][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 998.741871][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.749501][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 998.773655][T19212] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 998.784618][T19212] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 998.809334][T19212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 998.817674][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 998.827280][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 998.836981][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.844340][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 998.852824][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 998.862451][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 998.871663][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 998.880964][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 998.889858][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 998.900188][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 998.909520][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 998.918265][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 998.927167][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 998.936437][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 998.954589][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 998.965346][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:56:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xfffffff6, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xc0', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:52 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x429}], 0x8008, 0xffffffffffffffff) 08:56:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:52 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:52 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xffffffb1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) setfsuid(r4) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r3, 0x0, 0x0, 0x80000) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r5, 0x0, 0x20000000003, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000080)}, 0xfffffffffffffec0) [ 999.151743][T19230] EXT4-fs: 2 callbacks suppressed [ 999.151776][T19230] EXT4-fs (sda1): re-mounted. Opts: (null) [ 999.215229][T19233] EXT4-fs (sda1): re-mounted. Opts: (null) [ 999.244481][T19236] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:52 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x430}], 0x8008, 0xffffffffffffffff) 08:56:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:53 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd56) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20000000, &(0x7f0000000000)="90416ddd7d158831a2523e79e68cc001530dc8cecd9b68ce294566", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)="2afda4a40c3350c17e5df976be16f3214a21d78c42ae9419d7495a914317d92ed07c4a7177f4a6d1e636e68178b170b1cfc379c57bf24f7c45f4176be526a42f110984f3baf93fd48bff78fe13c8809832c58cd9dca64b836850b47e3f5d40380b1c0a7fd80a3b4669d8cea06baf6f519bfcf8fe4d726ed3d3ec016c4e33b4aa303b84776fa16707a04d0e4d83b3ecadbe1c13fb81ee2dcff7cd26fa1de11acb0577ae0e8d0006630250eea153479a79c489f5030e4fba809183f8b5") splice(r1, 0x0, r1, 0x0, 0x20002000003, 0x0) 08:56:53 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x431}], 0x8008, 0xffffffffffffffff) [ 999.536578][T19248] EXT4-fs (sda1): re-mounted. Opts: (null) [ 999.614280][T19253] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 999.692620][T19258] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xedc000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x0f', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:53 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:56:53 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x432}], 0x8008, 0xffffffffffffffff) [ 1000.018128][T19278] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1000.080713][T19274] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1000.114459][T19282] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x1000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:53 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x433}], 0x8008, 0xffffffffffffffff) 08:56:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fu0e\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1000.383388][T19290] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0xfffffffbfffffffd, 0x0) dup(0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='net/stat\x00') splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:56:54 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x434}], 0x8008, 0xffffffffffffffff) 08:56:54 executing program 1: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7fffffff, 0x402) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x44080) syz_open_pts(r0, 0x80000) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xa00, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r2}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x2, 0xde8}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(r3, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x20000000003, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)={{0x108, 0x8, 0x9, 0xce, 0x3b8, 0xcad, 0x171, 0x9}, "95da3f0a9366799752b8128f52e6ff21eea7dda2daac547d0613a841ecfbd8607b75c665cac3cf30bb", [[], [], [], [], [], [], [], [], [], []]}, 0xa49) 08:56:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:54 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000080)={0x0, 0xee3, 0x3, [], &(0x7f0000000040)=0x10000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000001c0)={@mcast2, 0x2, r6}) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000000)=0x1) 08:56:54 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x435}], 0x8008, 0xffffffffffffffff) 08:56:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1002.719003][T19348] IPVS: ftp: loaded support on port[0] = 21 [ 1002.838989][T19348] chnl_net:caif_netlink_parms(): no params data found [ 1002.931935][T19348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1002.940718][T19348] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.949472][T19348] device bridge_slave_0 entered promiscuous mode [ 1003.016772][T19348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.024050][T19348] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.033507][T19348] device bridge_slave_1 entered promiscuous mode [ 1003.112816][T19348] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1003.124614][T19348] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1003.202789][T19348] team0: Port device team_slave_0 added [ 1003.210942][T19348] team0: Port device team_slave_1 added [ 1003.269012][T19348] device hsr_slave_0 entered promiscuous mode [ 1003.305525][T19348] device hsr_slave_1 entered promiscuous mode [ 1003.432279][T19348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.440076][T19348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1003.448215][T19348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.457074][T19348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1003.492368][T19348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1003.502057][ T8970] device bridge_slave_1 left promiscuous mode [ 1003.511742][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.566190][ T8970] device bridge_slave_0 left promiscuous mode [ 1003.573084][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1005.258212][ T8970] device hsr_slave_1 left promiscuous mode [ 1005.320554][ T8970] device hsr_slave_0 left promiscuous mode [ 1005.380304][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1005.395104][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1005.406891][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1005.442116][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1005.530624][ T8970] bond0 (unregistering): Released all slaves [ 1005.663850][T19348] 8021q: adding VLAN 0 to HW filter on device team0 [ 1005.672323][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1005.680502][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 1005.690047][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 1005.698880][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1005.715174][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1005.725194][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1005.734232][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1005.742542][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1005.751630][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1005.761498][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1005.770562][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 1005.780268][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1005.788839][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1005.808492][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1005.819854][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1005.829657][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1005.839877][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1005.851287][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1005.860920][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1005.878888][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1005.888833][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1005.899180][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1005.908481][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1005.920226][T19348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1006.003848][T19348] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:56:59 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x436}], 0x8008, 0xffffffffffffffff) 08:56:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x7, 0x7, 0x3, 0x8, 0x6}) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:56:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xf8', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:56:59 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000080)={0x0, 0xee3, 0x3, [], &(0x7f0000000040)=0x10000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000001c0)={@mcast2, 0x2, r6}) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000000)=0x1) 08:56:59 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000040)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x55, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20000000003, 0x0) [ 1006.174243][T19359] EXT4-fs: 6 callbacks suppressed [ 1006.174272][T19359] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1006.255623][T19359] EXT4-fs (sda1): re-mounted. Opts: (null) 08:56:59 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x437}], 0x8008, 0xffffffffffffffff) 08:56:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:00 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) socket$inet6(0xa, 0x3, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x40) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 1006.500142][T19376] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:00 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x438}], 0x8008, 0xffffffffffffffff) [ 1006.560164][T19376] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xff', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1006.806263][T19390] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1006.870470][T19391] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x8000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:00 executing program 1: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$TIOCSTI(r1, 0x5412, 0x2) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) tee(r2, r2, 0x8, 0xa) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:00 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="2400000052001f001515f407000904ff0a00072207000100ffffffff0800e5ff00000006", 0x24) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:01 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x439}], 0x8008, 0xffffffffffffffff) [ 1007.412414][T19404] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1007.508142][T19412] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1008.902436][T19424] IPVS: ftp: loaded support on port[0] = 21 [ 1009.017302][T19424] chnl_net:caif_netlink_parms(): no params data found [ 1009.042263][T19424] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.050191][T19424] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.058110][T19424] device bridge_slave_0 entered promiscuous mode [ 1009.124012][T19424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.131460][T19424] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.139437][T19424] device bridge_slave_1 entered promiscuous mode [ 1009.215239][T19424] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1009.225148][T19424] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1009.297475][T19424] team0: Port device team_slave_0 added [ 1009.304541][T19424] team0: Port device team_slave_1 added [ 1009.357809][T19424] device hsr_slave_0 entered promiscuous mode [ 1009.395491][T19424] device hsr_slave_1 entered promiscuous mode [ 1009.501680][T19424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.508860][T19424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1009.516369][T19424] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.523793][T19424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1009.618463][T19424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1009.629659][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1009.638983][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.648007][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.657011][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1009.728517][T19424] 8021q: adding VLAN 0 to HW filter on device team0 [ 1009.740473][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1009.749209][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.756318][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1009.767386][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1009.776638][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.783797][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1009.858518][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1009.867639][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1009.878668][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1009.888093][ T8970] device bridge_slave_1 left promiscuous mode [ 1009.894282][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.956091][ T8970] device bridge_slave_0 left promiscuous mode [ 1009.962655][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.647984][ T8970] device hsr_slave_1 left promiscuous mode [ 1011.690084][ T8970] device hsr_slave_0 left promiscuous mode [ 1011.749698][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1011.761260][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1011.772805][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1011.819939][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1011.910039][ T8970] bond0 (unregistering): Released all slaves [ 1012.083817][T19424] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1012.094788][T19424] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1012.107541][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1012.116905][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1012.125170][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1012.145385][T19424] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:05 executing program 2: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="2400000052001f001515f407000904ff0a00072207000100ffffffff0800e5ff00000006", 0x24) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:05 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x500}], 0x8008, 0xffffffffffffffff) 08:57:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x10000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:05 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:05 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x40, 0x8001, 0xb7}) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000440)={0x530, 0x7, 0x1, "2f1bf73929d690d1b2159aed32fe55179c130dad89e37255bc684795119981cb", 0x59455247}) accept4(r2, 0x0, 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000400)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(r1, &(0x7f0000000180)="182317f3062e134787ab1a8acd5ab0d3bbff7b058fb7ac77695a7eeee9ae17ff15ea400ca6aba9945b7f8f65b62a5dd18bb39b20bcf719303d5ecf51cccf66c51f9bf9a0cd2e60c58acf692b74f1c71fe08d925f9a19862c1f9a9c79d6a6d9c0fca42e6a7d87be2148c2873717c441268721bd9e2641ddd8d987d0fa0ceea1928a2ff37ed989223b42bade021781e583d45be34509e726ed626812e86237fbb3f7a88d1a2f3c4c41186254875655164db3a62598213f8f7994582907f448dc74d164f4e506098000125c04f0c949c313ca02c10dd485a1f3", 0xd8, 0x24000000, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e24}, 0x6e) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000003c0)={0xa, &(0x7f0000000380)=[0x100000001, 0x8f, 0xc, 0xc00, 0x5, 0xffffffffffffff00, 0x90000000000000, 0x4, 0x9, 0x3]}) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000000c0)={0x2, 0x4, 0x7ff, 0x8, 0x7, 0xfffffffffffffffb}) splice(r0, 0x0, r3, 0x0, 0x20000000803, 0x0) bind$vsock_dgram(r0, &(0x7f0000000340)={0x28, 0x0, 0x0, @hyper}, 0x10) [ 1012.433975][T19436] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:06 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x600}], 0x8008, 0xffffffffffffffff) [ 1012.498648][T19447] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:06 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x700}], 0x8008, 0xffffffffffffffff) 08:57:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:06 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x900}], 0x8008, 0xffffffffffffffff) [ 1013.026626][T19470] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1013.089917][T19470] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:06 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xa00}], 0x8008, 0xffffffffffffffff) 08:57:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:07 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x440400}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=@deltaction={0x1a4, 0x31, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x58, 0x1, [{0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x8c}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}]}, @TCA_ACT_TAB={0x84, 0x1, [{0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x7e0000000}}, {0x18, 0x1a, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x7fff}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}, @TCA_ACT_TAB={0xb4, 0x1, [{0x14, 0x18, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x3f}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0xdee}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x187e}}, {0x14, 0x1d, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 1013.549187][T19493] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1013.583997][T19493] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1013.606474][T19498] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1014.941006][T19506] IPVS: ftp: loaded support on port[0] = 21 [ 1015.000315][T19506] chnl_net:caif_netlink_parms(): no params data found [ 1015.031319][T19506] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.038741][T19506] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.046897][T19506] device bridge_slave_0 entered promiscuous mode [ 1015.054820][T19506] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.062222][T19506] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.069964][T19506] device bridge_slave_1 entered promiscuous mode [ 1015.086321][T19506] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1015.096651][T19506] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1015.112697][T19506] team0: Port device team_slave_0 added [ 1015.120014][T19506] team0: Port device team_slave_1 added [ 1015.177760][T19506] device hsr_slave_0 entered promiscuous mode [ 1015.215511][T19506] device hsr_slave_1 entered promiscuous mode [ 1015.271906][T19506] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.313068][T19506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1015.320448][T19506] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.327705][T19506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.364171][T19506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1015.378415][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1015.387108][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.395188][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.403815][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1015.415951][T19506] 8021q: adding VLAN 0 to HW filter on device team0 [ 1015.426278][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1015.434725][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.442008][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.452476][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1015.461054][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.468289][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1015.487674][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1015.497075][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1015.506738][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1015.520940][T19506] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1015.531928][T19506] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1015.544595][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1015.553123][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1015.561848][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1015.581233][T19506] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf0ffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:09 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x1, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x7, 0x70, 0x1, 0xffffffffffffff09, 0x7, 0xffffffffffffffff, 0x0, 0x8, 0x4000, 0x8, 0x100, 0x1800000000000000, 0x80000001, 0x0, 0x4, 0x0, 0x320, 0xffff, 0x5, 0x4, 0x2, 0x1, 0x2a6b724b8, 0xc8, 0x401, 0x2, 0x7ff, 0xfffffffffffffffd, 0x7, 0x3, 0x5, 0x20, 0x58, 0x6, 0x8, 0x3ff, 0x8000, 0xa6f, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x800, 0x81, 0x3, 0x9, 0x7fff, 0x9, 0x5}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:09 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xb00}], 0x8008, 0xffffffffffffffff) 08:57:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:09 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) accept4(r2, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x8, 0x80803, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) fstatfs(r3, &(0x7f0000000000)=""/232) 08:57:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1015.740480][T19521] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1015.751208][T19520] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1015.770710][T19521] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:09 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xd00}], 0x8008, 0xffffffffffffffff) 08:57:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:09 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xe00}], 0x8008, 0xffffffffffffffff) 08:57:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:09 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000003dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:57:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xf83f0000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:10 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_cancel(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000040)="42a10057eccdd415f5657ac4530d51bd6d08d914ef6f64bf23f548f1b25a516ec3d1ea9eaa382a1330c7767c1c71157662327942362cf027f54c57402aeec236febf76afc198b619ea3b9082ed8d6a205522a3f0b3d6e9928f02dbc5364d72fbe5831a81b9f559f083142fd7e3bccbe18e075a1ffa3d1a74bf6c2341534df20ef4bd0efdbe82408c2da1", 0x8a, 0x101, 0x0, 0x0, r1}, &(0x7f00000001c0)) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x1020}], 0x8008, 0xffffffffffffffff) 08:57:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:10 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) munlockall() write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) membarrier(0x8, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x1200}], 0x8008, 0xffffffffffffffff) 08:57:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x100000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x1400}], 0x8008, 0xffffffffffffffff) 08:57:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:10 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000003dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:57:10 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2000}], 0x8008, 0xffffffffffffffff) 08:57:10 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @multicast1}, &(0x7f00000003c0)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000400)={@multicast2, @multicast1, 0x0}, &(0x7f0000000440)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@multicast2, @loopback, 0x0}, &(0x7f0000000580)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)={0x190, r5, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r6}, {0x174, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x99fe}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x51}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}]}, 0x190}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:57:10 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) ioctl$RTC_AIE_ON(r1, 0x7001) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x17f) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x11ec, 0x2d, 0x11, 0x70bd27, 0x25dfdbfb, {0x1}, [@generic="60c96bdd9390f86ba12afa8a1bc99ef633fa5cb6473ff7cab5362f6c24a2b14645ffeb9450bd66652fc894f52a9b165812aab207b444d027ff9d4f4f893a5e23917d3cfb8c5dd5d8b1b4015a416e94de2a3c607141f87999f7b55c50f592328aaebaf6a2239366d7d5c32f0f73889c07bd682264131c5edb4de9a2051eecb54e8b1b1a3674ccb5b2958598ad1e6f6bf05fda6e583125dcc780d2b92b919ef89f7f73701072287f804787443ff8db4fb329ecaf3906dc1a6f3a5e2d2bf93395736cfb411c171c5002d6a41774b0736d2cccfb7f806f439b20bb82a833bd", @generic="00de0917ac79c0d53e1d20bff43af872c3be016e37863cab8346f3cb8ea2244a8b3ab9bb13f247dcb930e356564519fa6d572b7d80b4529fc4158c5baea7158abfef3d4a55402b2cae28ad7edb133623b8d89abd19a8ca60b239a488d282dd24b183e194b76e7a3c04ddd7e51ecfbcf7ba2abe5d196ef16392b43d20db9c4612d611f4e0a61902575a837eca2ae3ccc3c3584f20e4e393137490c5f595fbe83120d7e967df2280e91eeeeaf9f1ebc0ca44f195de8a811e73209e5ead9d8ed42a1355225f0b8b764b8b52bd57d6c9c90bcf47eaed2ce43df5e27900867624cc77a97644f064f49e516ef9d5ddec92e9af5da78cc409a5867058f8470827865d00bccfd644b6bcb697063e9c29ecb256a570150ee0fb6944a163457740ba32546c3130e242c285784a9f4054f08a10e2b1782ccaf749ceeaacf13297a8bfa13ae8d7ff84b7e7bd15115bfd9d30ecb3d6a1606b4d0d5c28aed7eea25d499f03900921f3906c4c3cbf6857b210438e931e463e0e05aef7a2127e7cd81d492ba5ad1cc0250851ed11da928e8d3e59e97a93790d33c83c1f9de4b78d89f0a36cdb2912c2afec9fdd4a49c3db0985f090ab54fbdbd2df9dabaf4a80866e3e73344f0e514880ed223b5f5ad02722f8a01b316cfe6773c6645785246e00e7a2b2ea085377c6c6e90d8093bb13b91289740f122c8adfcbdb570cc2d0ec3a10fef3c9a2e075ca77dd0091bf581cf6f1a666779377bcda2a27086a9283376abf6a2ec8e551d618e12580097ae98b29a7846f1b09e67e59e169e81edcf5b3a9cd6b4e2420834eacba49e21399d0c05108a6471c2dce07e3567ff3fb83ddd19403305a2da1a0d7806a83f9861dfdedf40f615183987554c72362c7f389e842ae4a7e9fe6b3dea981f7ca19a03e7eccaf5f2f748f44a01a74eba3880640b19ea81ae8ed01ff0452694a7d1d7c4bca92e03b08cbb7a3ffe1ea5d6d0648a8aafbfc809158726ed0067ebd67960b26ec4e5d5e535d43f046c87c06de06912dc3ec846542d33d6143430f5b546d7e5adc7ff17fb1cd95b6cb17cf15e6cef114a730a37e071e6ff7444c61c832ba7a8caceedb2409f0df8a6d246660566782af3279ba559e43f44cbe8a12fc893393e1de0f8a271740f891f0211d02ce5265466fcb05292efa94e8808ff49dd1ceddbd2d63ad7eaa58e00dd0e1f6397e53879a0a28b99911cece792d8ad6ba9b35b0b11ae40f302d1d0c834610ec8e4a7e62cabf60326c4f1b83d804a785a965244d6cd48782033b09afc96456d64cee13e78aeb6ffe4607ef15c92d781af9a38b461c520c9c454ad4a0d8a165beb758da452b22b8343d85a8cf47ad20d57acaba43081001ae0cc320ec91b40e14846b5e381ea468277ba77e03f00d07ee8558cc176bbf517ac3be2c4ed0da5076d897740a62116a08e2221ea8bfc88ec7bcb5c4183ad78239296f98cac3f2201f4066de69c40d335c19983d40eddcb5a5538392c7dc7f5a9bb3f5b974614a25fed860e1b8b84fdef62dda02484c08b7e707104fe6205929dd8e9e3d0dc1725f5acff5de91aeaa6874ac7274fac1829b58d3391013e0b601195fff8962453607b4fec205c834e884a47a5ff5025e5a5ff1120f54f94c56e808b7dc6b2569565e89ef928401421f7d55ed515f2933181111202e02adb84b3c78a58e231ce3d110ce99ed9f0e24ede60fcd9f787640af22cf41b0def7421817c8968f0840459c75433842bd432b4abf4c2caca9d3ca3a3605de9e0c9cb7eb53c756ef36c3a30b81f3920e5e0cc90a686b63b0bf2c5222449bf4f514bfd5f5f2a611aedac2a7a1b3ec34c2fd6cc335d402cb82e2069ac971dd86d7720455136a91af76db2e86b658bc835a14bf8ac904bfde87321ab8a45a815245de3b9537415da8fa6fb81464d8ccced501638d50fda8e4ac0e35510dd4288d896f6b3d9c858d7e9c52fe68e6e9fbaf3bbcc046597156b7a2f4d521d048043e3255e6a74372acbbba5786f3807762c065749a68175b1237b27053a5f84afb5abd70422fa6ccfcff45326df9150e4a8f73b69cb7e104d689745c9d4a6da8ca6acf9d502908fd173deaacfcbc519cb01ac013a9b6a34b8317b112e045ed211fa95d8f2917b3cdc287355c7238211082f4f285978726e99acf450500f01b257b971d547a5fd5a7adb6385098ceb7e1fbf3ce3b3fe18e2a302bba7d216fc8772eb6ee06057dc5e3e1c6eb6e73bba8def549e41090a9be3ae6392e79cb3c8ea5de144f717f7fdb44c77d0bd502f5091b3219c650414dff402380c7a22f81a32b958192ed3b3b108a27177c76d228712c148e6bf3347870f99f25bbdc40da1d8b3d7e41029940a0f5244c7117551f46ce21641fea0e35853a9f86bd03a38faa687f720f4b94f491f4eab075c031c505531af1384e1eec981a786f7340f3f0946ee184a0879652b9fb63d512d6a1d35122a78c6f98d138aeac777632ed0b561c43aec06eb95f009eac035f82d67c37a37610b12e5ed2489408bb14e75f8f8b493230b1f79f3ee2c49f8f28f262e8d201eabf68362c786746e5744d2eae9147f08723acd2c67e58f856c0bf33fac3bee50caf70743131503c11108d70bf39aef1aebc935581c77cfd8591d570f21dd7bd8137ec735c3b8ae747a7773d37282539a40f282d85263640a552d15a8a4ad0348f60577fffb171101355a9fa83119c994fb3ec00704947e201a91501ea63f633da0f9792008d63445fd3ab7e8bcffa7ac82166435b7f4676e3e299f6761807687736547473d8e5f23ad997bfaa113f992ee0a461a38bbb71259814c171a8d9d9901d1d4060cdf0c40fb306c9e8f8721c5660d9e2563f15ab5a6831ceb9e08bce7e0314340922775cb0e3b6d0d67c75819fd1ce22708e7815910800475459a59993c2a46793571fe69a28038490ac567acc548e06865580655d225ffa2b6ae2e3a1a2e3bf7b7c21a47c6d72d11440b0e004b50c009d48e51dff9946e9e3f85abe73a3ae19ec09ee659754d6db70e338fd39185440edbc103195fedfc8d506e0063498de646d67b46170d10c4e7cfa134763454f5e857c7654f1d941176d3eb97a8e9897fc91190782c93ad78fcd26f19b11ef5f09128068a70bddde808181d915ace1e7b784a97f879a64aa3c25f8bb33fdf9c942b0afe86f1951560d91d3836caebc4b97951bfbb4104b54f1014cc665170f5e20daa06ee5e85b241e1f083e403dba80c3f18bc54f4be1263572498bf34df1135fc9feb46c46615876029c82c89b90091c405c26928d007b413b44ed137b17632bfee6101a49703bda2663fe792159c426d8bf032ddcd4554d058187259261109d1f7c1bcea8dcf0494e4be326f1b5e46ad2e6ddedd91480a5796e418def249a4e57cecd8df5bf4739c443e423bca24f81b95502f5a5e32d8e591df6672ae06aa4e2c5600a222f0407113bdf1ff7d3b98090d6b987657e4900511b2f683722ee19c40d168d139faacaaca4e473d3fe62bc449c67b04f831b16a8a7ba7e25d50e6dddbbea24d96bbf3487f62c4a935579c8f321bffcc5c34bd91f2d6cd21f9bbdbce1ddfefd5d264c3e54f87fa075aea15fad3de4ceb893daafee19820762a4fedc423802a832e5d79c4d79b2022aa1668638aff0ee45dd2003884236b0a83ff2ada7fbce4c2aa2c1ede9141e7e309858c3f9eeaa20cd503a24d2988054dafa3c1a65ed6b5e950ea30e2e904f0529a6951abf97d8cbb15eadc7c6c3cd83f7bfd754f94afb6ef5da5bd4ff1e07d550948c2da576b568b6f844d7e51abdb0784ba8d5d63aba601705dd58f83c0197090ea0e620046adc7894011947c11be3d503d457c975f4b820ab682cf8abdaa30be63bda23b273aee2ea7a1bade5a21d8c273e4f7854cdfdae2f4bf11d88aeef1603397bd5911c5af5e6ba3c2f9a3e8f90e2b3fe456a76b0d506dbb917d8a8fb6bb6974fd5e95fc83735b5196545949190d5b8b4df15e5f0ac97145c31c72f2ee84a5b8286c2bf9c0ddc21fd9408adaffcf3e31636211e0a3f9bebb1d60caee46df4d787c9a3b0df977e93c33ab07a368d8fb8326368d3927bf16e592c11d9bd0e5bbe2da62a3cb63fbb431558b9849cf73c065f1873031e2d0ad5af63488b691401dc18b11fdc896f711b9619ed3282edb3c08a14b691ffd8f2d36b3be394df093c718195da6796356c52e2d9806294f91aabc0623cd212b869de50652be80c99b96ea63da763cdcda151e19b3a39cac7a53492a9f040696e29233e5f91085ec0dba9f8a57b4973e0dbbda50f13f0d8cf81a81c41359c3e8afaedcb770eba3563496343d4fef2dc2f1f072cd44640df1d59d05c5dec767367e2ff61be49b9678ff291fc5147c63473c8aebd03eb455404f6b7393e70e69808cd11a9f4c152400575bcd738f51de3ce8b740adf43dfcd802ab0b865c8a00e06e4bde8bcb951f0e42fee667048368c2656a15c72ae183b620d370165a8d36e9b1758908e0abcae3e5dc33e0e096148fb4d0d5ef199f934a906af8314806b072b315f05ab386b621b4677b979bed65e4f1216a503bc376eda4556d76e0038fca4d87b807329858b3b8e346a573a0784716531a41333afdfcc710e67f1381659a7297550ffa2108a5e54d3da095e59f661b20108591d4280a969b17f325fdb6178be34b6e110abf9e67067c920ab1115d38c14358d93f28f3938a02db9c9b71387974c00d8afea4bc55834f30ed09a585de1feac476067458fce420a511e457563bfb9cb46b1da5b583d728dcb5acadc7fc20940443351e223b8730241afa5f2eaa9448ce2873f4a84177a86a1c490d843bbfe222d504be1c59ce3ce7c5539e3233bb2d223a1dd0085be8fbdc32545e14bbd15ed993bbab8a22274f95f2d14a1e4e6fee46b9f7e6628818e7827c4600386bff499b5266ef8f2d478db224d515250bd6c42b6dd7946c99973fc02abb677b8e8edd33af8c67dc841ee4cde5a59348e461594ed9e9dc3e1a889c087cdc285cbc2bf8f3d3125fd3e1edfe7909a5d32e8341e3debedfc4cbd1bea465999f610cecba00e3644a5a4149130ca05f3beca7fb1dc7a6176a08b49a8deded41c9684b4d978e73a1179b2f1f9ebdde44e3a0982801f5d3e4fbf282038c6e7859b9225502164c9df3789aadc005ab4c2679955d76c8d814ffe69b52c86fc4800348bd512f1d519d323665ca35473d7731837f8bb431dbd6ce6b7dbd3579935154289acabd2f9b5be69f6e1f73df7ce2eaabe4dae5d660aafeb7cbf2e5ff9acee7c11e22d59f1de284a6cfe91d93af341c7d366e844a7b05306175328e13ae92359d978a9f11adff0cf18dc53019ad9a5d619528f11787cdef6a704da8c7ffc5640a254829ca5072ee6d246ca902c9d40f3d5edb62ac76bc7a9944143b5d858a567f8ad45feda21f9235cd79213f3584692969be8494b1437bcd0e03348fc88040d772f30b055efad10566cfc570fcf17eb763dad2a2a788a4a9cd706c4d3f43c3d449bbb8488787b81d06991d1b7f94761fc0be385d746da8b316f1b44ca7b60d47d6de2eca21b14418ea2edcdb4b612b847136c5ef1adc8bd6f2cb5d74882a80d7195d9b9f0641dd42c47a91561ea535ab7ed6c659d3f6699c44e1f6acac229f9873d0fb89eab3d00ce9f78a2613b5c946ffb8b72e5d3656794f1160b5fdcb8d2a01622e766d5019ee7dcf00cafb63e5c3cfdb35bc43d80ced09d9ae3bf5dfeeab7650fa4fe11b898af49264e86df2a6ae2873b818110a7ad4dfbc858095362a0f65badabc47d9236a28716", @generic="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"]}, 0x11ec}}, 0x5b34111bcf39d78a) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x3) 08:57:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2010}], 0x8008, 0xffffffffffffffff) 08:57:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:11 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000003dc", 0xa}], 0x8008, 0xffffffffffffffff) [ 1017.546995][T19619] EXT4-fs: 14 callbacks suppressed [ 1017.547050][T19619] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1017.636492][T19623] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1018.795665][ T8970] device bridge_slave_1 left promiscuous mode [ 1018.802184][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.866094][ T8970] device bridge_slave_0 left promiscuous mode [ 1018.872413][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.598108][ T8970] device hsr_slave_1 left promiscuous mode [ 1020.658667][ T8970] device hsr_slave_0 left promiscuous mode [ 1020.710082][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1020.722007][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1020.734778][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1020.811101][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1020.901771][ T8970] bond0 (unregistering): Released all slaves [ 1021.063912][T19632] IPVS: ftp: loaded support on port[0] = 21 [ 1021.063968][T19634] IPVS: ftp: loaded support on port[0] = 21 [ 1021.197545][T19632] chnl_net:caif_netlink_parms(): no params data found [ 1021.214849][T19634] chnl_net:caif_netlink_parms(): no params data found [ 1021.245918][T19632] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.253050][T19632] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.262289][T19632] device bridge_slave_0 entered promiscuous mode [ 1021.274070][T19632] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.281487][T19632] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.289540][T19632] device bridge_slave_1 entered promiscuous mode [ 1021.351039][T19632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1021.364705][T19632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1021.373298][T19634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.388204][T19634] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.400193][T19634] device bridge_slave_0 entered promiscuous mode [ 1021.420188][T19634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.431018][T19634] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.442724][T19634] device bridge_slave_1 entered promiscuous mode [ 1021.464270][T19632] team0: Port device team_slave_0 added [ 1021.483215][T19632] team0: Port device team_slave_1 added [ 1021.490423][T19634] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1021.510917][T19634] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1021.577534][T19632] device hsr_slave_0 entered promiscuous mode [ 1021.635361][T19632] device hsr_slave_1 entered promiscuous mode [ 1021.691711][T19634] team0: Port device team_slave_0 added [ 1021.714130][T19632] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.721293][T19632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1021.729145][T19632] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.736414][T19632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1021.759085][T19634] team0: Port device team_slave_1 added [ 1021.867585][T19634] device hsr_slave_0 entered promiscuous mode [ 1021.905384][T19634] device hsr_slave_1 entered promiscuous mode [ 1022.002984][T19634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.010194][T19634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.017708][T19634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.024768][T19634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.042747][T19632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1022.071184][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1022.081726][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.090226][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.099859][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.109497][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.131007][T19632] 8021q: adding VLAN 0 to HW filter on device team0 [ 1022.165491][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1022.174255][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1022.183838][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.190953][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.199450][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1022.209012][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1022.217501][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.224853][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.232520][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1022.241184][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1022.258159][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1022.267029][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1022.275665][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1022.289874][T19634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1022.302420][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1022.319067][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1022.338496][T19632] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1022.357075][T19632] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1022.375688][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1022.383947][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1022.400858][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1022.412670][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1022.428827][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1022.440452][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1022.454671][T19634] 8021q: adding VLAN 0 to HW filter on device team0 [ 1022.469662][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1022.514386][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1022.523213][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1022.532533][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.539885][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.548218][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1022.556953][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1022.565508][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.572730][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.580572][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1022.592264][T19632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1022.605461][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1022.635103][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1022.643801][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1022.675799][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1022.685963][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1022.697535][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1022.706421][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1022.717585][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 08:57:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x200000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2300}], 0x8008, 0xffffffffffffffff) 08:57:16 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0xffffffffffffffb8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:16 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x5db3, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 1022.726449][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1022.736408][T19634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1022.744027][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1022.804175][T19634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1022.840253][T19648] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1022.874284][T19648] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x25f8}], 0x8008, 0xffffffffffffffff) [ 1023.052306][T19663] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1023.080672][T19667] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x25fb}], 0x8008, 0xffffffffffffffff) 08:57:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:16 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_buf(r1, 0x107, 0xd, &(0x7f0000000500)="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", 0xff) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000240)={0x224e, 0x7, 0x4, 0x8001, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}]}) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x5) write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x60, 0x3, 0x6}, 0x6}}, 0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x800, 0xa156, 0x5, 0x7, 0x8}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0xa23, 0x7, 0x8005, 0xffffffffffffff00, 0x4, 0x7ff, 0x7, 0x2, r4}, &(0x7f0000000200)=0x20) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2600}], 0x8008, 0xffffffffffffffff) [ 1023.442582][T19681] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1023.484838][T19685] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:17 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2804}], 0x8008, 0xffffffffffffffff) 08:57:17 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x300000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:17 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x20000) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 1023.955940][T19713] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1024.024773][T19713] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:17 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2904}], 0x8008, 0xffffffffffffffff) 08:57:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1024.131522][T19721] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1024.267917][T19728] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:17 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3004}], 0x8008, 0xffffffffffffffff) 08:57:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xff', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f+se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:18 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3104}], 0x8008, 0xffffffffffffffff) 08:57:18 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x812, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x48000}, 0x1) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:18 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd56) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000000001ff, 0x6) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a00)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000b40)={@local, r3}, 0x14) [ 1025.726768][ T8970] device bridge_slave_1 left promiscuous mode [ 1025.733156][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.795842][ T8970] device bridge_slave_0 left promiscuous mode [ 1025.802139][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.538172][ T8970] device hsr_slave_1 left promiscuous mode [ 1027.590546][ T8970] device hsr_slave_0 left promiscuous mode [ 1027.658673][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1027.672790][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1027.684236][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1027.739406][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1027.827336][ T8970] bond0 (unregistering): Released all slaves [ 1027.922978][T19780] IPVS: ftp: loaded support on port[0] = 21 [ 1027.982817][T19780] chnl_net:caif_netlink_parms(): no params data found [ 1028.012382][T19780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.019702][T19780] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.028387][T19780] device bridge_slave_0 entered promiscuous mode [ 1028.036953][T19780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.044179][T19780] bridge0: port 2(bridge_slave_1) entered disabled state [ 1028.052761][T19780] device bridge_slave_1 entered promiscuous mode [ 1028.071185][T19780] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1028.081570][T19780] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1028.100049][T19780] team0: Port device team_slave_0 added [ 1028.107705][T19780] team0: Port device team_slave_1 added [ 1028.167837][T19780] device hsr_slave_0 entered promiscuous mode [ 1028.205732][T19780] device hsr_slave_1 entered promiscuous mode [ 1028.257005][T19780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.264098][T19780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1028.271451][T19780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.286868][T19780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1028.400946][T19780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1028.423803][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1028.440723][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.453483][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1028.477631][T19780] 8021q: adding VLAN 0 to HW filter on device team0 [ 1028.490378][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1028.502940][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.510764][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1028.528060][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1028.536662][ T3686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.543710][ T3686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1028.566916][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1028.583357][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1028.592135][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1028.613089][T19780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1028.625691][T19780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1028.633860][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1028.642589][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1028.663988][T19780] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x400000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:22 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3204}], 0x8008, 0xffffffffffffffff) 08:57:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f*se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:22 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x78440) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:22 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) [ 1028.924682][T19794] EXT4-fs: 6 callbacks suppressed [ 1028.924725][T19794] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1028.950457][T19797] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1028.992654][T19803] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='f#se\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:22 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3304}], 0x8008, 0xffffffffffffffff) 08:57:22 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) close(r0) 08:57:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xff', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1029.171643][T19812] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:22 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3404}], 0x8008, 0xffffffffffffffff) 08:57:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1029.290397][T19820] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1029.367381][T19820] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1029.505370][T19831] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x500000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xff', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:23 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000340)={0x8, 0x0, [{0x80000008, 0x7, 0x3, 0x6, 0xffffffff, 0x8000, 0xffffffff}, {0x0, 0x80000001, 0x7, 0x6, 0x534981c8, 0xde, 0x4}, {0xc000000f, 0x5, 0x0, 0xffffffff, 0x59, 0x0, 0xa3}, {0x80000007, 0x1d8, 0x4, 0x7fff, 0x8, 0x3, 0x5}, {0xc000001d, 0x6, 0x4, 0x1, 0x8020000000000000, 0xd4, 0x9}, {0x8000000d, 0x6, 0x2, 0x2, 0x4, 0x5, 0x4}, {0x80000007, 0x0, 0x4, 0x1, 0x5, 0x101, 0x2}, {0xc0000004, 0x8, 0x5, 0x7fffffff, 0x5, 0x4, 0x32a0}]}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x10}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) accept4(r1, 0x0, 0x0, 0x800) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r3, 0x0, r2, 0x0, 0x20000000003, 0x8) 08:57:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='.use\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3504}], 0x8008, 0xffffffffffffffff) 08:57:23 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000554000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x3ffffffffffff41, 0x0, [], [{0x8, 0x8, 0x8000000000000, 0x81, 0x5, 0x4}, {0x200, 0x3, 0xd0, 0x40, 0x100000000, 0xfff}], [[], [], [], [], [], [], [], []]}) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 1029.868256][T19851] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1029.889174][T19852] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:23 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000432dc", 0xa}], 0x8008, 0xffffffffffffffff) 08:57:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3604}], 0x8008, 0xffffffffffffffff) [ 1029.948628][T19859] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x600000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1030.077906][T19864] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop2 08:57:23 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3704}], 0x8008, 0xffffffffffffffff) 08:57:23 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x4, 0x7, 0x743d}) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$VT_ACTIVATE(r1, 0x5606, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="000086df0100f34fa0db507bae30408cc9ddf682adf877a12f81bf51792ba1e079699ed94aa65774bc87512eaf224fce79b8a1e07240bbc6d797a7665ca80900000000000000a7c723c32906f78a98b6ddf1b3c1f54021d08bff010000000000000f1030aac94e4e717a93446f3a42a0751fd33ed9f8ff7b2f4f5d079edefee0bf5bbea4d9fa33c1d39ebd59c34643a832ef9bc006f38f55544bfb806014d7dcb4f3019ee9a263b4a8f42a32465d7c1f468a66d0bb2a9427083865bb81e136266635ca8ccabfc6dafcb4d89189e7f86a6a2082740fa8c2ce46"], 0xd9) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 08:57:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:24 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3804}], 0x8008, 0xffffffffffffffff) 08:57:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:24 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3904}], 0x8008, 0xffffffffffffffff) 08:57:24 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="bafe570f9ff3dc2d2bde0107f17683eb", 0x10) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) getdents64(r2, &(0x7f0000000340)=""/4096, 0x1000) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f00000000c0), r0, &(0x7f0000000180), 0xff, 0x6) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-neon\x00'}, 0x58) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:24 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3f00}], 0x8008, 0xffffffffffffffff) 08:57:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x8c', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1032.603908][T19937] IPVS: ftp: loaded support on port[0] = 21 [ 1032.903643][T19937] chnl_net:caif_netlink_parms(): no params data found [ 1032.932277][T19937] bridge0: port 1(bridge_slave_0) entered blocking state [ 1032.940767][T19937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1032.948906][T19937] device bridge_slave_0 entered promiscuous mode [ 1033.078364][T19937] bridge0: port 2(bridge_slave_1) entered blocking state [ 1033.085880][T19937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.093549][T19937] device bridge_slave_1 entered promiscuous mode [ 1033.112173][T19937] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1033.122295][T19937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1033.264834][T19937] team0: Port device team_slave_0 added [ 1033.272477][T19937] team0: Port device team_slave_1 added [ 1033.457114][T19937] device hsr_slave_0 entered promiscuous mode [ 1033.485594][T19937] device hsr_slave_1 entered promiscuous mode [ 1033.526369][ T8970] device bridge_slave_1 left promiscuous mode [ 1033.532578][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.586168][ T8970] device bridge_slave_0 left promiscuous mode [ 1033.592550][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.646338][ T8970] device bridge_slave_1 left promiscuous mode [ 1033.652494][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.696055][ T8970] device bridge_slave_0 left promiscuous mode [ 1033.702361][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.048628][ T8970] device hsr_slave_1 left promiscuous mode [ 1037.108471][ T8970] device hsr_slave_0 left promiscuous mode [ 1037.160509][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1037.172030][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1037.184611][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1037.222168][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1037.312210][ T8970] bond0 (unregistering): Released all slaves [ 1037.457408][ T8970] device hsr_slave_1 left promiscuous mode [ 1037.508990][ T8970] device hsr_slave_0 left promiscuous mode [ 1037.560488][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1037.573844][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1037.586853][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1037.621354][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1037.712150][ T8970] bond0 (unregistering): Released all slaves [ 1037.825923][T19937] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.833398][T19937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1037.841034][T19937] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.848308][T19937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.857506][ T3686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.865486][ T3686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.902465][T19937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1037.913722][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1037.922858][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1037.935568][T19937] 8021q: adding VLAN 0 to HW filter on device team0 [ 1037.956553][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1037.968175][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1037.976719][T12436] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.983806][T12436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.991656][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1038.000247][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1038.009356][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 1038.016467][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1038.024047][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1038.032819][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1038.041638][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1038.050589][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1038.059126][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1038.067897][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1038.077162][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1038.090704][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1038.099534][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1038.108621][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1038.117446][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1038.130033][T19937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1038.152011][T19937] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x700000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:31 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) epoll_create(0x7) ptrace$getregs(0xc, r3, 0x0, &(0x7f0000000040)=""/177) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:31 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x4000}], 0x8008, 0xffffffffffffffff) 08:57:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xf5', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:31 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x4, 0x7, 0x743d}) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$VT_ACTIVATE(r1, 0x5606, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="000086df0100f34fa0db507bae30408cc9ddf682adf877a12f81bf51792ba1e079699ed94aa65774bc87512eaf224fce79b8a1e07240bbc6d797a7665ca80900000000000000a7c723c32906f78a98b6ddf1b3c1f54021d08bff010000000000000f1030aac94e4e717a93446f3a42a0751fd33ed9f8ff7b2f4f5d079edefee0bf5bbea4d9fa33c1d39ebd59c34643a832ef9bc006f38f55544bfb806014d7dcb4f3019ee9a263b4a8f42a32465d7c1f468a66d0bb2a9427083865bb81e136266635ca8ccabfc6dafcb4d89189e7f86a6a2082740fa8c2ce46"], 0xd9) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 08:57:31 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x86240, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x3ff}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x93, r4}) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) dup3(r2, r2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fchmod(r1, 0x104) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x20000000001, 0x0) [ 1038.367232][T19956] EXT4-fs: 8 callbacks suppressed [ 1038.367259][T19956] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:32 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6000}], 0x8008, 0xffffffffffffffff) [ 1038.428690][T19956] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xf6', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1038.607121][T19972] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:32 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6d00}], 0x8008, 0xffffffffffffffff) [ 1038.660245][T19972] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1038.869283][T19981] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1038.913608][T19981] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0xa00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:32 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:32 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6e00}], 0x8008, 0xffffffffffffffff) 08:57:32 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000180)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/92, 0x5c}], 0x1}, 0x2) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000002c0)="6bc42506475d55ccd0eb722b51da45c90dcf8c0bbfc8a143c4cea367ecd03af2fcb765", 0x23) write$binfmt_elf64(r2, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x100000001, 0x3d4f, 0x7ff, 0xff, 0x3, 0x3e, 0x1, 0x171, 0x40, 0x11e, 0x3d98, 0x9, 0x38, 0x2, 0x3, 0x1, 0x4249}, [{0x6474e557, 0x401, 0x0, 0x6f8, 0x20, 0x8, 0x800, 0x401}], "b30e1fbbb2f1799f9e2caf735b49f4e27fc15a6c0da8f3166b355679661d1147d1495100a2858368c31fa609", [[], [], []]}, 0x3a4) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) syz_open_procfs(r5, &(0x7f0000000080)='net/route\x00') splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 1039.233667][T19989] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1039.268786][T19997] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1039.312680][T20004] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x1000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xdc00}], 0x8008, 0xffffffffffffffff) 08:57:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:33 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0xffffffffffffffa2) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400000, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x80000) splice(r0, 0x0, r1, 0x0, 0x20000000007, 0x800000000000000) 08:57:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xedc0}], 0x8008, 0xffffffffffffffff) [ 1039.585174][T20018] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xf825}], 0x8008, 0xffffffffffffffff) 08:57:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xfb25}], 0x8008, 0xffffffffffffffff) 08:57:33 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:33 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xff0f}], 0x8008, 0xffffffffffffffff) 08:57:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1041.931547][T20067] IPVS: ftp: loaded support on port[0] = 21 [ 1042.231534][T20067] chnl_net:caif_netlink_parms(): no params data found [ 1042.381269][T20067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1042.388933][T20067] bridge0: port 1(bridge_slave_0) entered disabled state [ 1042.398035][T20067] device bridge_slave_0 entered promiscuous mode [ 1042.406511][T20067] bridge0: port 2(bridge_slave_1) entered blocking state [ 1042.413619][T20067] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.421718][T20067] device bridge_slave_1 entered promiscuous mode [ 1042.553846][T20067] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1042.564453][T20067] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1042.703022][T20067] team0: Port device team_slave_0 added [ 1042.710515][T20067] team0: Port device team_slave_1 added [ 1042.746811][T20067] device hsr_slave_0 entered promiscuous mode [ 1042.785478][T20067] device hsr_slave_1 entered promiscuous mode [ 1042.959936][T20067] bridge0: port 2(bridge_slave_1) entered blocking state [ 1042.967042][T20067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1042.974499][T20067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1042.981749][T20067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1043.137316][T20067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1043.151228][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1043.160236][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 1043.168659][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1043.177866][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1043.309113][T20067] 8021q: adding VLAN 0 to HW filter on device team0 [ 1043.320050][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1043.329333][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1043.338071][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1043.345270][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1043.353691][ T8970] device bridge_slave_1 left promiscuous mode [ 1043.361165][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1043.406483][ T8970] device bridge_slave_0 left promiscuous mode [ 1043.412707][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1043.468388][ T8970] device bridge_slave_1 left promiscuous mode [ 1043.474613][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1043.526244][ T8970] device bridge_slave_0 left promiscuous mode [ 1043.532422][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.766955][ T8970] device hsr_slave_1 left promiscuous mode [ 1046.820368][ T8970] device hsr_slave_0 left promiscuous mode [ 1046.908169][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1046.919425][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1046.931769][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1046.972272][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1047.047283][ T8970] bond0 (unregistering): Released all slaves [ 1047.178269][ T8970] device hsr_slave_1 left promiscuous mode [ 1047.221044][ T8970] device hsr_slave_0 left promiscuous mode [ 1047.281302][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1047.293400][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1047.305465][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1047.340641][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1047.420039][ T8970] bond0 (unregistering): Released all slaves [ 1047.547769][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1047.559177][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1047.568228][T12436] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.575363][T12436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1047.583180][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1047.591898][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1047.600596][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1047.609298][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1047.618069][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1047.630764][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1047.639587][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1047.651515][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1047.660725][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1047.680991][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1047.690324][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1047.700948][T20067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1047.718920][T20067] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x2000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:41 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x20000}], 0x8008, 0xffffffffffffffff) 08:57:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$smack_current(r0, &(0x7f00000001c0)='eth0:\xff+:\x00', 0x9) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$rose(r1, &(0x7f0000000000)="ab9ec73813d8a05a5920fb081b88c6676a78bb8210afe07e51ff636ff7a634dfb64029bbd36783fc0561cded3580cacbbf36d9ea19f16b76d30802ce44d4a894dc344a8ce97b3dafb80bdbdefa6a96dce5f4b1470415d1ef12f448a7152ab8e9559d8025adf898369deea0250c7b67fde4d0e34114cfb20931eb927842cb9b2284739371d900b7ef5f279ac64359b29658fa5f4c8121da9d112830a6b31bce1dd1d3236c5c9155a7aa804631ab185d27325a51c6c9ee6f5d6bd9e7a612d5e171d6f704c6cc0b0dbbb543f9f409eeef5fbb4eca35127371f08e9ca86c63a9fc60fff089bc06c8", 0xe6, 0x8000, &(0x7f0000000180)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:57:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\xff', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, &(0x7f0000000080)=0xc3) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:41 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) [ 1047.900605][T20082] EXT4-fs: 5 callbacks suppressed [ 1047.900648][T20082] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1047.958585][T20085] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:41 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x40000}], 0x8008, 0xffffffffffffffff) 08:57:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1048.172170][T20094] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:41 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x407ff}], 0x8008, 0xffffffffffffffff) [ 1048.245209][T20096] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}}) dup(0xffffffffffffffff) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:57:42 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYRES16=0x0, @ANYPTR, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRESOCT=r0, @ANYPTR, @ANYRESHEX=r0], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYBLOB="5cb855adb663d51d921ab73a9fd20db46ae88a6172fd3a79be14a02758d69079ad6b36c8a97d6f1b8df7fee4aebbee950a8dec978f", @ANYPTR64], @ANYRES64=r1], 0xfffffffffffffe51) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x3f00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x40800}], 0x8008, 0xffffffffffffffff) [ 1048.852475][T20111] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1048.952188][T20111] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:42 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x80400}], 0x8008, 0xffffffffffffffff) [ 1049.181815][T20128] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1049.240299][T20128] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1050.579882][T20142] IPVS: ftp: loaded support on port[0] = 21 [ 1050.693891][T20142] chnl_net:caif_netlink_parms(): no params data found [ 1050.777772][T20142] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.786061][T20142] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.793849][T20142] device bridge_slave_0 entered promiscuous mode [ 1050.802016][T20142] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.809603][T20142] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.817726][T20142] device bridge_slave_1 entered promiscuous mode [ 1050.890283][T20142] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1050.900837][T20142] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1050.916882][T20142] team0: Port device team_slave_0 added [ 1050.982371][T20142] team0: Port device team_slave_1 added [ 1051.047739][T20142] device hsr_slave_0 entered promiscuous mode [ 1051.115350][T20142] device hsr_slave_1 entered promiscuous mode [ 1051.238064][T20142] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.245181][T20142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1051.252907][T20142] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.260163][T20142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1051.356074][T20142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1051.369111][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1051.377383][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.385864][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.393955][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1051.464829][T20142] 8021q: adding VLAN 0 to HW filter on device team0 [ 1051.476957][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1051.486012][ T1042] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.493264][ T1042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1051.567955][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1051.576885][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.584087][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1051.603005][T20142] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1051.617727][T20142] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1051.630824][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1051.639927][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1051.648877][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1051.657778][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1051.666441][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1051.673986][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1051.690742][ T8970] device bridge_slave_1 left promiscuous mode [ 1051.697179][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.746412][ T8970] device bridge_slave_0 left promiscuous mode [ 1051.752731][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.428001][ T8970] device hsr_slave_1 left promiscuous mode [ 1053.479919][ T8970] device hsr_slave_0 left promiscuous mode [ 1053.539705][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1053.551218][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1053.563292][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1053.609598][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1053.698313][ T8970] bond0 (unregistering): Released all slaves [ 1053.792943][T20142] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:47 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$binfmt_script(r0, &(0x7f0000001040)={'#! ', './file0/file0'}, 0x11) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 08:57:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:47 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xe0000}], 0x8008, 0xffffffffffffffff) 08:57:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1053.894384][T20150] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0xa8, 0x0, 0x8, [{0x5, 0x1b8, 0x3a, 0x2, 'selinux(eth1%wlan0.system\x8b%selinux*{/eth1userGPLvboxnet1*('}, {0x0, 0x8, 0x5, 0x200, 'hash\x00'}, {0x0, 0xff, 0x3, 0x1f, '/\\Y'}]}, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000001c0)={0x9, {{0xa, 0x4e22, 0x3, @remote, 0x7}}}, 0x88) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) [ 1054.005637][T20154] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:47 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x100000}], 0x8008, 0xffffffffffffffff) [ 1054.079093][T20162] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:47 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x200000}], 0x8008, 0xffffffffffffffff) [ 1054.402320][T20173] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:48 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x3b6) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:57:48 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x260000}], 0x8008, 0xffffffffffffffff) 08:57:48 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000240), &(0x7f00000002c0)=0x4) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = getuid() fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) unshare(0x20070600) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) lchown(&(0x7f0000000280)='./file0\x00', r3, r4) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r5 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) close(r5) getsockopt$inet_mreqn(r1, 0x0, 0x80000000023, &(0x7f0000000180)={@rand_addr, @remote, 0x0}, &(0x7f00000001c0)=0xfffffffffffffee5) bind$packet(r0, &(0x7f0000000200)={0x11, 0xd, r6, 0x1, 0x9a5}, 0x14) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x20000000003, 0x0) [ 1054.718866][T20173] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:48 executing program 2: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) mbind(&(0x7f0000be3000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x5) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) [ 1056.327988][T20205] IPVS: ftp: loaded support on port[0] = 21 [ 1056.442949][T20205] chnl_net:caif_netlink_parms(): no params data found [ 1056.534785][T20205] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.542357][T20205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.550281][T20205] device bridge_slave_0 entered promiscuous mode [ 1056.616632][T20205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.624055][T20205] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.632401][T20205] device bridge_slave_1 entered promiscuous mode [ 1056.647765][T20205] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1056.659065][T20205] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1056.734572][T20205] team0: Port device team_slave_0 added [ 1056.742512][T20205] team0: Port device team_slave_1 added [ 1056.807438][T20205] device hsr_slave_0 entered promiscuous mode [ 1056.845493][T20205] device hsr_slave_1 entered promiscuous mode [ 1056.980048][T20205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.987255][T20205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1056.994672][T20205] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.003635][T20205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.037871][T20205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1057.111389][T20205] 8021q: adding VLAN 0 to HW filter on device team0 [ 1057.119736][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1057.127813][T12436] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.135698][T12436] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.143895][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1057.226159][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1057.234886][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.242207][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.250137][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1057.259880][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.268169][T14781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.276541][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1057.285744][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1057.360253][T20205] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1057.371407][T20205] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1057.384074][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1057.392002][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1057.401237][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1057.410023][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1057.420337][ T8970] device bridge_slave_1 left promiscuous mode [ 1057.427175][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.476288][ T8970] device bridge_slave_0 left promiscuous mode [ 1057.482686][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.097886][ T8970] device hsr_slave_1 left promiscuous mode [ 1059.140140][ T8970] device hsr_slave_0 left promiscuous mode [ 1059.180219][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1059.191506][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1059.203310][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1059.242379][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1059.328071][ T8970] bond0 (unregistering): Released all slaves [ 1059.452288][T20205] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4800000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:53 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x400000}], 0x8008, 0xffffffffffffffff) 08:57:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:53 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000340)=0xf2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000380)={r3, 0xeb, "5665540d2c3b6fb809ac99e713b7a5c5979b0a8f6c6b0d2a72e673eaa885ed56c894d9f716e0a174d7afe733577d18517b240cc2dad0073aa28011aade158fb7658edd7c01bda20391fc48532b72d1cb01cbe2812a1507e094507e8c966474d603780847492ae3322648b29f2f050a0489598e11d0cb647fbd8a563dbefdac38a74fa1346fc48a4743ba0d5b5d1a9cc82f46beed534cccdfbf4895e8dbe8fc8ad715facacd58f5abd0195f719825db44c49607bb65be5013f0b3bb6863426f76c2a67dcf0c0f1764839c6f4923a0aebff1bbe20f39e8be4f0bd7789c05a9f908a13356b2358b4f6a74882f"}, &(0x7f0000000480)=0xf3) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20000000003, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000000)={{0x80000000, 0xfff}, 'port0\x00', 0x84, 0x11000, 0x1f83, 0x10001, 0x7ff, 0x80, 0x1, 0x0, 0x1, 0x3}) 08:57:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:57:53 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000000)={0x40000000}) [ 1059.634461][T20218] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1059.660994][T20222] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1059.725108][ C1] net_ratelimit: 2 callbacks suppressed [ 1059.725115][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.736572][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:57:53 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x600000}], 0x8008, 0xffffffffffffffff) 08:57:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1059.885089][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.890928][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1059.992547][T20235] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:53 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x80ffff}], 0x8008, 0xffffffffffffffff) [ 1060.076213][T20235] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1060.285441][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.296552][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:57:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) splice(r0, 0x0, r1, 0x0, 0x3, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_proto_private(r2, 0x89f1, &(0x7f0000000000)="57b845f789aa4f746dea0f13c2201fed56f296ddb3b3f7fd9d57c297e11404f9537a31b010a8b6fd2d1eb187d94bfb798718b518a2282a1b2a9ecd919891fbcbfb3db13903d8d770d531c424fdb4dc17791dd73551915e43ae4733c427eaae47b973dda0f10b1499715ac77c806b311f11a674b968df552b3f88a3a2bb3ac95dfde4472054b2d94f7f941ac6fb2084017d79ae8afcffe0559659a91f9682e25919d9e1672b883e529e3fb73e7dea24da9d54b774772a6ccb7a57f5eef5b111307238e8bed11f41c1caa8de2e142288c3ec5c375ce0e53cbd1c0e44debf158774fb41f2f0180f3131183a3aab1cf049b7fe75") munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x411) eventfd2(0xffffffff, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) getsockopt$inet6_dccp_buf(r4, 0x21, 0xc, &(0x7f0000001b80)=""/228, &(0x7f0000001c80)=0xe4) write$selinux_user(r4, &(0x7f0000001b40)={'system_u:object_r:etc_t:s0', 0x20, 'user_u\x00'}, 0x22) r6 = accept4(r5, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/hwrng\x00', 0x8000, 0x0) sendmsg$rds(r6, &(0x7f00000019c0)={&(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/201, 0xc9}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="1800000000000000140100000c000000ffffffff000000005800000000000000140100000900000001000000ff030000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="0100000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="2abc000000000000"], @ANYBLOB="9a000000000000000500000000000000fbffffffffffffff04000000000000000800000000000000020000000000000048000000000000001401000001000000f8ffffffdd910000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="b100000000000000", @ANYPTR=&(0x7f0000001700)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="9400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="d800000000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000"], @ANYBLOB="8c00000000000000", @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000"], @ANYBLOB="040000000000000002000000000000000900000000000000580000000000000014010000090000000500000002000000", @ANYPTR=&(0x7f0000001740)=ANY=[@ANYBLOB="0101000000000000"], @ANYPTR=&(0x7f0000001780)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="05000000000000000101000000000000200000000000000005000000000000000800000000000000ff0f000000000000580000000000000014010000080000000100000008000000", @ANYPTR=&(0x7f00000017c0)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000001800)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ffff000000000000ffff0000000000000700000000000000d97900000000000008000000000000007200000000000000"], 0x168, 0x80}, 0x8000) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000001a80)=0x1, 0x4) rt_sigpending(&(0x7f0000001ac0), 0x8) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000001b00)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r3, 0x0, r6, 0x0, 0x20000000003, 0x0) socket$inet(0x2, 0x0, 0x0) 08:57:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x4c00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:57:54 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x801, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', 'posix_acl_accessC-nodevmd5sum$nodev-\x00'}, &(0x7f0000000180)=""/104, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:57:54 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xa0ffff}], 0x8008, 0xffffffffffffffff) [ 1060.669905][T20261] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1060.720793][T20255] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1060.950344][T20274] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1060.976594][T20275] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1062.175724][T20282] IPVS: ftp: loaded support on port[0] = 21 [ 1062.239975][T20282] chnl_net:caif_netlink_parms(): no params data found [ 1062.268220][T20282] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.275683][T20282] bridge0: port 1(bridge_slave_0) entered disabled state [ 1062.283409][T20282] device bridge_slave_0 entered promiscuous mode [ 1062.291273][T20282] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.298595][T20282] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.306750][T20282] device bridge_slave_1 entered promiscuous mode [ 1062.441120][T20282] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1062.451177][T20282] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1062.534228][T20282] team0: Port device team_slave_0 added [ 1062.542343][T20282] team0: Port device team_slave_1 added [ 1062.586677][T20282] device hsr_slave_0 entered promiscuous mode [ 1062.625391][T20282] device hsr_slave_1 entered promiscuous mode [ 1062.741993][T20282] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.749270][T20282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.756757][T20282] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.764079][T20282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1062.798394][T20282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1062.871579][T20282] 8021q: adding VLAN 0 to HW filter on device team0 [ 1062.879367][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1062.887360][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1062.895687][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.903992][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1062.921249][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1062.930308][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.937420][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1062.945551][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1062.954549][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.961821][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1063.040345][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1063.049216][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1063.061104][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1063.137371][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1063.146244][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1063.156654][T20282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1063.232993][T20282] 8021q: adding VLAN 0 to HW filter on device batadv0 08:57:56 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xc0ffff}], 0x8008, 0xffffffffffffffff) 08:57:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:57:56 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r3, 0xd000000000000000}, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2bbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000000c0)=0x300000000, &(0x7f0000000180)=0x1) sendmmsg(r0, &(0x7f0000000880)=[{{&(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x401, "8453c8f0221d372042bf0b4755f88e6e4e366168fb1f0d9869a1b17f89b2a21c8597baf730193c91b3da9703c09bc73fa93885e5f3b1b139c1f948e49c96bf", 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)="65d380f4ebaf23086b62c3ef9cf0b38f0b98d9d2c8115df462c4fdc7ca0ce1163d6f30e2afbe", 0x26}, {&(0x7f0000000380)="f1d9a68197f10ef466cc05322d42881a825b276f4a9494d39ee866424591ed33c8b08dab2e3c9383dff808ff20722b98e9fa1632fee07c10d6671d2d0adc831f23a6e81cc9fa9d88b08d4e546538b6d29fd9725c2b5b5d6c13d4d07c9ec182c6153ed54d904198552a2b4a328d1c27db00912c15f53932", 0x77}, {&(0x7f0000000400)}, {&(0x7f0000000440)="7c9d57dab9f09bd568f1020f55bc00bcf218e39396aeb8aaef17d70cee252a58c1c8a8ef66d01466a901b1a0f0c0584856282257688d83f4e7c810817853c825296cb6c7b125ccf655d131f4712ea0e823570f99b262bbf50fb6824f902ab66af0f1880e4fa4bb70a4c0160954c308b3588256f18847a199dc9b7eb3ab89eb52a1e13e0817e6f4b74e1c42ff3f59ab46cfd9a9416fbcea628e5a867e6399e2", 0x9f}], 0x4, &(0x7f0000000540)=[{0x20, 0x105, 0x101, "96cca7ad62b3db1174cd696dd2"}, {0xe8, 0x0, 0x2, "e1277192d4654c34e93edcbeae4ea61413050ed420b9d710ffd1e9c67800fe87a3d2650a44c552f63221a99cdf8a457745660ef7444af14a9f3cf871914746da5d4bb424957b39843ba5edee6a14cf2ae085eac55d1954e749a85536667ba13e9a875ec7a6a141452ab981d794b9546a0ef3d371fefbe2721ac345f5c1d44be2d7d0571dbc05874524aae14416118f9d773bb9b0f72e8418db58088196f1ee5ec2f3120cd770809726faa93e3abdb9e2ab2b87c4fe30b0086c01e23156eabaeb511095df0b3b8d1a07664da670e95bd96f225377a892e520"}, {0xe8, 0x11f, 0x4, "3e2315224090d19bcf3c1f7587b02c5cd606dff945efaf19c476caae6480f9796b7b45eff0ade00467d5a9f17d74eba3bb64cbee9b8a12c698eeb986a5c62fad3ddd04041609001b80e3ca42af9fd999f0de9963ef2ecdbe0d28d2113d33d7ced042a83b19e3bde030d4737db204128b10eb58d2f8caed34f3d1c9a2b3bffaa1047598fcba6e1c4d41170de38922040e5419fa351f9816806aa8e34163b297500d9e65f5d312e9b04c7403e54d57ee1ec9f6908681c0b369695667d68e18e830946d9758c474aed481f570abbdfcef478d864c250100"}, {0x10, 0x3a}, {0x68, 0x1ff, 0x2, "de9389c6d34b0f925a2e72cfdd9f228a94ee4acc7ac3d992313af0bcac8eee72feae160562dd26ce4ecb8c31815aa91fe0dbe52c7143652ac9e7ac9d72050a4cbe6c47401b772d16053141918f1f0c7ebb9ea9"}, {0xc8, 0x11f, 0xe677, "2ca176e7825e41a3af27e5ab48a6a25f84fe75650b9d9180991f9da07bab067941f721f928bb8595c258450652175046744ec8178147710247f8e09ec26d960ba0d65e5e75ba6da3f0137d17284f75fb4076c39714aade8ec5d0b7db85aea3e1f04997d6871b59c30d9728277bc89073596ee47ef09590dd4aef402c34a76dd07a3dc3cdbe3f15ed6e085437525e3d3571460723b9bb546c749c1ced3fe95072fc143f221bffd461e3e2abfb508f4e1970b9749f4584"}], 0x330}, 0x5}], 0x1, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) accept$alg(r0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) getsockopt$rose(r1, 0x104, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x2f2) 08:57:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:57:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) [ 1063.468499][T20296] EXT4-fs (sda1): re-mounted. Opts: (null) 08:57:57 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xdc0000}], 0x8008, 0xffffffffffffffff) [ 1063.533061][T20296] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1063.688188][ T8970] device bridge_slave_1 left promiscuous mode [ 1063.694570][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1063.752295][ T8970] device bridge_slave_0 left promiscuous mode [ 1063.760458][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.447983][ T8970] device hsr_slave_1 left promiscuous mode [ 1065.518339][ T8970] device hsr_slave_0 left promiscuous mode [ 1065.599685][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1065.613638][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1065.625670][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1065.649982][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1065.751826][ T8970] bond0 (unregistering): Released all slaves 08:58:00 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1c100, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:58:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:00 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x1000000}], 0x8008, 0xffffffffffffffff) 08:58:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) [ 1067.296277][T20285] IPVS: ftp: loaded support on port[0] = 21 [ 1067.374166][T20327] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1067.418644][T20335] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1067.521993][T20285] chnl_net:caif_netlink_parms(): no params data found [ 1067.554592][T20285] bridge0: port 1(bridge_slave_0) entered blocking state [ 1067.561948][T20285] bridge0: port 1(bridge_slave_0) entered disabled state [ 1067.569908][T20285] device bridge_slave_0 entered promiscuous mode [ 1067.577858][T20285] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.585024][T20285] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.592688][T20285] device bridge_slave_1 entered promiscuous mode [ 1067.609666][T20285] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1067.620035][T20285] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1067.636802][T20285] team0: Port device team_slave_0 added [ 1067.643638][T20285] team0: Port device team_slave_1 added [ 1067.709933][T20285] device hsr_slave_0 entered promiscuous mode [ 1067.765444][T20285] device hsr_slave_1 entered promiscuous mode [ 1067.844845][T20285] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.852317][T20285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1067.859698][T20285] bridge0: port 1(bridge_slave_0) entered blocking state [ 1067.866816][T20285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1067.901929][T20285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1067.913889][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1067.923179][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 1067.931451][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.940346][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1067.952187][T20285] 8021q: adding VLAN 0 to HW filter on device team0 [ 1067.964299][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1067.973676][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1067.981046][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1067.995719][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1068.004196][ T1042] bridge0: port 2(bridge_slave_1) entered blocking state [ 1068.011890][ T1042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1068.026608][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1068.035932][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1068.048269][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1068.059289][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1068.074526][T20285] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1068.086740][T20285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1068.095229][T12436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1068.115697][T20285] 8021q: adding VLAN 0 to HW filter on device batadv0 08:58:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6800000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:58:01 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x80000000, 0x0, "5d571be19e7782ce367f9363aca22aed688e2fd232463bb1b1303d0257ccb2c02358f929a04f440a60da41c4b77854f910dfcf9c6d5b7503786564f8ba55ba", 0x3a}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000080)="a709bfed6a6b49c37a3dba0baa403d63a194", 0x12}, {&(0x7f0000000180)="017f8665f21ad4e8a5da756776d6ed87bb552cb701e966dad9d9b3c5e168ecb697e1f40e5d7c74239985b0ba44fb89978114da2c8d53a05eb241dd48ddca84af1391f4eb2e497245123a7d3cdb8d57057becde5a566c924e6c7b27bcd03bbe1558dd80a0d63a5d10620a123404b020d6e7c7f8533fad17100040f660f8edc8d17e34d25ecfa9e600358b5f277fb52c00c18c420675ce138050467a8c08b093ac82159513d9f82d73dcc13884bda369b135af6b654bcdddc9dac2d57b80ca0ff3231d1cffc0ff8b436278f2137941ae9557a840a5b121312f280c50e9faafa330c0aa8299ccb868a32f4ca558c8c0c1a2", 0xf0}, {&(0x7f00000000c0)="423cec5187fbb828a33628cc6b2609f38f0b6a5d", 0x14}, {&(0x7f0000000340)="71cd055014119aa568ba86a846755f8d5dd3a91985156c669ed359606e654f3fe5505662010b53375d9f14d7be6c4592ad6c40d9bde1dd8867f17cd3c8ef26c9c224badf127d8fb25461823aea48a470af38a97e7d6a8293142dcf52ad08120390d19a5f008ecc33632f44b72ba7a739912e8dc8bdb8fe0f43c1e3b20786f57e308bf0d637b712ab6979cb9f2323c3034a9e3d6c243554f8dfa044aa405987740035e0752430c96f547e644bf542b2fedd38581f874b5c31", 0xb8}, {&(0x7f0000000400)="653e973d790759dafbe16d3668039551529dbede1549d3be83928f1a622dc72cab2552a7b4129bd45eb478d7668399764668cfb02b8a3bb02518dc8454479611736be5eaa75a53919fb7fb3d594f2e41bc9b9a09bf85248d29a80e3a3af4acc5e68287391705b1cdbaf954b2dac214d6d2c6d25d0995a007ac5a65d85558d1c486cc45535739b72c2d44292ba102a4ac887e092c896a5631c3d013fc1617467c56228f231ad8250e970539c0ae4a1517352c87", 0xb3}, {&(0x7f00000004c0)="713986159870c142c0acb9dbc52d58f3d629165f3fcdd83bd0148411b9c7d2c70e5675854b48079798c33ee5355d403f252c9471a0213253350dd6f9acd5ae30d0719f8a7c0e4a102ab9c25b584cc532e2e878f56e1355843fa8cb753ed733d90047a2cd60a208c6d33e3752d34a3d3dc989eb83531c5d68a3953f2b759821411b4b680b378e6c7a5c91a4b94491e9af48df1ad64d8befb99264ee3c45a8c023da1da092db195a59102ecd00fe12fcd3fe653cbfffb67ae0a6cef615aa948a00006171eabafe34748f", 0xc9}, {&(0x7f0000000280)="f51e02625d61c84e1035ed9895bd150dc7fe7cfb70dff9996b321e310e0f0a8fe7c19e5770a646d46ab965d09deec3cc821d81ee823f94ac72a05f82a476859b7bc7c7151fd43a9269d0cd6056976a252058dac533afe7f83dc734cab7a4dc74388289f781ee68f215fd9c6919d2ad878aa60d79e9", 0x75}, {&(0x7f00000005c0)="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", 0xff}, {&(0x7f00000006c0)="14e2e670f43daaa47f338780aae3c0a37e4c7758b442c0d078d7b951450a9e18f231260dbdaa975c85b41d", 0x2b}, {&(0x7f0000000700)="feccb9272bec0468183e841615405ccaa2e7a3a445d05897b95616ba0810a74e420a9f310b8347826f621a6ac8c11beca71fb70da4a104df3332765109805cd5798803cb93386de15eae99b062a1a35fb1d20af02de1b59fd61c51255a7d064be837ca87d84d7c6ae2dea1c1713e694d772e9adf5f8f8f7aa00fd0f01d2c59c631c21f10e898456fa2b99233ed2da2720e301d927b40cba8b7957b452822584e0b8a8654e08c991cdf919a23942c27f2e793c1f14097ec3276fbe7bac8e51b3fd65756bd5d3aea2caef4740271eafa5f424110d8e781cf0ba73e1a5c866f1a293554fcb2d1", 0xe5}], 0xa, &(0x7f00000008c0)=[{0x38, 0x10d, 0x40, "23c2fdf3300987e598abf4e3aeda6c7948c99033de027221b86404ce47ac329771cc07603c"}, {0x1010, 0x0, 0x3, "3f51bc76f357e23ec6cfff5eb20f9b82796ac1b9c6615232d4e2e49a3aef729c18980cf08a0b0870122636fcafb15054d09f6bbd438ad99e666d6486e1fb836bbd559d63903dcb766bf8cd5b079ede97e43577d5aee72f547b35c352e0d73df45a197987e675fcbd0f31d75884928c45bdad8c088b1ebf2e52d39009ec3c6bb62b1fc7f547cdaabc14660dc820ee32b0efcc94a5d5d6567c86b76f81aa16e9136a61abc776a612521f39f93d418beea553db00c68635e39b07c4001209dfd124c58f83a4922668b3ee0100f6d5c329cfe367923643f543107d5f4e3eab048b69e6937d99ff56ecb566ef0265db944e6d030b9d252d41ac579404121a5814f227770b0eb1f0ed01ffd8825e4bc3f9219edc22372d6b300287befa57800896cf3f00c5e21a6e092222aaab9b36df458e8b8e4abe1aae34a264f5c6440d0695b01d0df8cb57c1aca317237d83a4e3ab9d6b0e619b6ebb28f6218c2501dd0355e1e8361641fa1c3056916ee5fe856ecd7e5dab68be1a8bc5a92f33613b58b55a0c15498841c5756d7c6dc8023531ac4cee3dc11c4da9aae6a3c70e39c08bce6bd76a7a77a4e1223fb8341d4828adeaf78e17ae49c13a56f04722231057269608bdb1c463c4980bf5d89c2d3ab12eb47bed0141570ac46f3bdefe2e3329224e23ceb45537481fcf5fd4d4aaa0f37b659eec1f2ad8d3158531cce79d20b7e8801a6aa5c3c168d81059f0a0cb9676fd14b857343850f39080fc9440193508cd66ec2e769b8ef4e06ae28a2e19bf6c73ac2519ef642488df0e9e12a9084357901a8e20fa04d7134f4d8c371486ae2a48dc4e42e2b57fc4d2b8fe97454c298201d65673ddbccbd78ec69e66bcf18c84b4ec9fd85b52f8cf085c6f622a74537f3975e16996f5b85848269336bb556a5deb0906aedcb4b446844f4e0be3db2c89162d30b7ab925f7fdde6755c0fbfdb95c82aac02bb9ff24d53c85293336ae19a098428ebe93127d1a7b053ad5653fa69dcb9224e7a5f516b50b7cb242a6fbe449e6b20321921094c52911af8f2643cfb491081d3be81eadd1df525db5b8b1a219e924eb15780d69f49bb9884ec20975df9736ec0be81c487ef0df3f4f765cca97fdce5dc1cc3bbf486b6e8af8241192bdd918fbb11dd2dc437d5adf2088e68fe1778388f0082e2bd8835fa5479990ba8322468fb2305a2fd4191f9e4cb1998c8835dce75b9eec430b5c0b9fd6fc8ab7545fbf7f44ffff4f843bec82524b6480c8c4abcded82135133d117e910dd60f895f7f036cf8e0b4d2067dc9f82b819a776480ba23bcd47f0c0730f3662f605fd06dc2cb9bc50d2dcd3b06dc97e935c1b8981e0b9538d1e0ed6a841ee40118696608d602859752ef425d6d5982e1b88f521e36c5379802a016e1bd3339ec2da5f0f1ea595ef4356fb3f73835e1072c25c8cab4e7eb4e3525cbff5cad5af8a3b4c70c9521665fa14111f63902bba7fd78bef401301f8422465c93e5e58f223216fa5dfbc9e71e74ce8064c195e6deb66b3c790160441149254c9396aa829da882e363b66457bad856f743b902e2f29950f3284d8f0ebfe46d7a0d9a819aaf628f96dd3cb402ad09e154b0b154f916a4d179db32296e8fddf3d5622549f73fe423bbb9b264ab42fda91521dc24289a512ea0a3ed9ffd71cff4042093b4dd7edaace253b2c39dd83c9952c505c839b359e261a6c335a85891e5bc93d96c998876b976a538f666e831a1e949d9e649585498a2dbe93f997b4fab3869f1a315d84b167a5c24e5a1ec4d49256630c9161518b7bc1d21a104f153b54d996c9545a1e2c1edf277b7a38a4182799452efe1c5d93ebd4c34810a978772e9c14ae7590fa26654771650ab7fd58e96135f0910ffe176b4667e2de30927c020127eba884b1ab2b54cfad51ec5fb264242b972050db8ca2075b167bcd791789fb3dc3def0289f74a67970d4e8f836c5d87008f78ff7b0b0e72c318d1c669fe670b9961d73b30cfaf0a6bee3b4bbda22bab10185186a7e23b34f242642d24ba314a1c319dc1a5f961c40ce9c30313cc35961a7780f617a2304021287c8b9d6c4f137e0337015ece285c9eb885a84c89287a5cff9150d08246c06116cf871d44dffac86bf42068def721df56387a3022b2b532e9cf9772c27afa1648a2766c5950565997f97774e9247ee9bd67111f21f05376037e7a639b5a0cfe0cf0756b2eedfdb336f1fa2e4047934fba185d86cacf561bccc8129ef5848b3c4ee8ae1fec70544798f63da4d2679fbfdc221979dab7594860c1b471e37d6a34e62454ebc7269fef146ba9c17fd7b69718c75d19a26ed9b597e5ec7b47eb4b98b79270d6df00426c8fb2ab167669093caa364594ea6229a0803f8ea76c49b06baf0085710a36c25592b6fa088b46f19949fc3d831bfeeb4dfe2337129922ae541aa8a7718dd9d017b527e286ad806cf524d6866df11d0067781adcd2d8aa5a860d48639c21ec4ec3543e76748c3cf8250c59cc313266bb1ff005454e0882e5c0dcc7076e3543466a1067a94455162dbdb321de10bf1f561e934a5259d590e8b49115f9f6dbb5cac0108bf434d940920265f521165477c6e4fc8f4592d01c30d3e9356808bf33c0fa30a514281851a971de3b35f74553a01e5ead0ff561f08941c4cd75cec67424ee8d02a4765fd5f421d77065d7645b788ed1da45e77fcc0c37a1af4ecf0364b8c10fa68752cfbe029c433668fe6cf35f4b7d8f9421cbdce7371fb45e06b5fce1e328cc5a415cb944868974fbabb44cf0345b9f6ec42901f85955218db523cfda293c01ac2e5c00b9bca2aa2b14ce15da6090b5a2ee941f4385c7ea3f84d4fdb7613fb44aac81e21548c2580505c7cdfc6615dae559afc12e3a893a7d87637d82edbcb1ab3fafcd8ece83e0dad4a4cb5ebdea077f4c749638553a3fbe4b5fd29e595694a92081322fa1393962821f5611ca52605c777a99a1a8d1ed1266f54f3f31d81df7248af2fb870b63668bba7466aac9c817d7a31368f11355a78f489bad3817d522f81ae0d946a8d6ed97bf1aeb276d08653fd06bd301114cdc93c4610eaf80cb08852e121cc650fe36199f5980858a21447cd65bfb5084f155546ec13af842ba3466896a9cc45a382d39be0e4541a5dd3d3dbec6ed2aaade60c3d2533c05a00561ee9cdf981020b23b3024fd84720e297cf41aa898714f12800b1410826a123bcb19589e5ceebb0c7f2ae7fe9d37a1ce5bb7f5324ec54947c9103b89228e1d0fe2719fa15a7837c7bd99854fcb8110f3c444615e21a8762b5168ae75e213e5cd8d2ccce18b5c2cc1acaf68603a1674326781cbdcb83ce99dd5846f6d1a6508c8d4e9b473bfae019d1e45ccb16f30371e6b00a66fb3d84e12d29bcf00de7612720c6dedd1d01c12f26566ae9eba4082692ef78802946a5ca1cdc84c8adafbb3623c3e7f636d38f63363310b8b450b3ec65ed9a15fe505fcb907f54c6053b12a9e4a5cce7fccd98bbae89ba70fdf98a551b0955612ab6092d007f3ade2fcd34349539c12b2e7c59b0fb6c41e4be20ddfe5ece0baa81739bf6e823e94dcbe9418957b4cb31c44dba7b711ecff745cfff9a75d97f640d67ba21a133526c8e2c604fb0fb77139b8d83a44f37d5c2bbe7e2e8bd40b7298faaf99c57ce16860780882bc2220441b1bc452a2401f7d88d572c888bb214c106652476c4681ad1fc27acbbfdee964e1247a94efa29d516bd42f40ee2184aae3ae49e87f2582c34e9f2be2e25d1bcd343d37b829e776662dbec97d91be800325260b5bd13dc4394cf810d42b8aaf29b8a3cea4be24ec1e5e542c5b10d9b6d8210b3e26099959814bbc1e2836eae8cb9de6f1686245c169b30a1c794275ee6f3771e02f334931365547f66dc84aca75305854367f67c70e980a69dba9882407e6b4f91277a27a252dfb62d9e76b1bf3d76e6838f5882298146248b65d1252a7ae6dc9cdfd0c7fae396d9eba2d0de602920430b4cf53d1436c0987a44139cd7d5e6362b69a08c5d199305e83907970eb0aa81a62d5f5a0deedd28631ffb13cc8dd8c6ad7d2ae552ffff2e8ae94a113c0a8fe225fc7962d7f4a5763482676d41bb2a66dc25effde2774faf13e225fc125055be510a619aad18ed0af1fa627bf7aefddb462099295eb4941a3960abd8b618f8253cc0881a62573636c433cad558ce2f48d6b7a43945a38c35df530fa8e2a97d00ddc454e650bf07bf43c943691587e7535043afe15c148291c8f85af62bf405484d2949af7cff095c95f9cbfd3cd0a9bb4f60347b351e894becc18e70887751faa2c75a9ad056b39392838c10d7ad9dc6b223febd582ebc58ce701bae1d27388f983b698b48e8dd212f06ac364f9aef29700bcc301b4403f4dd0f7de4c806524ff716c5e2710b3a710447071341802446889e4138a7d9d81eb1cac4b64590db93322e8bfadca8bfeec8f0b2b97539624a03c72fcbdf561115b5f57dee70dd48be1b2b5dc5b0ae5f3287d132ed1591fb4f5aa8c87810b4a96536c42c76cda96b32f56a3280f1dc1bc092b512c0a9bc8e1cabf13892ec5e7ed2e2b22251236b15d897c0e1895ff2e68034b17b5a571d8e0b88d02c711b4aa1c5ed79ab003c696b52d5febb165428012a6ae4d05b388e64cb0551059d344c8016af5e94ce98b71d93f731bf06611a615f0cfa5cec02a93b445b3c6cf2af9c289627013208daa61ca44ce670155888d083ece5cef29184354b72ccce7ce09d58340db3a353895510329166783d199bfaa1af6591be632345e367614e784550b1580f8b08c640b876b7c5e1106ab9edfe638482ffef312c6d686312e686de7372ab81a9df22e2958c7d96f90443f29ffe8b59c99255b467137417cbb7aadf53b4477b8f78319db023a16caa02d666fded0c7521d7e904967008b0205f8580f10a96a9ecd65ecb299ea4191554008791d4a3555a2f641c5dd1f1fe77bec3f09f920a626aad8daaacdbdf15ea6ac999f84593b04fe592bf3a34a1837f1809dae8323a8b16bd967420a3919b8d6b67e46a73544a6a33ed8cc7ffe45bab7af4a9fd5030b20c934f958faa0908a022bda1a74b7c5f7a6a4790b2097ce7fcc7cc39db1aa98c47ebfae6a6cc7264cc7c4b7bf9e9fe2dc9a0e02433006f92c5e1bd5b92e7e7632de62a25b52df8bac20c2edef8e453eb8b9bd063de8f38dbc49e68997646bcd390210d0679abf5a3dc9e2f6faba4a1a23dd02ebdc1cefc8963291f880684cb9ad7be5a6c16b70a8aedae28b619c4b89e82a2c9c1c1f6ac3fbde2aaa03f1c9ed739e81d89d029b2373c2b2c3e40efc3975ca64b983d73926b48e1236698a78aa8d338a041550bed1d4c4d7f624fd229dba547c32fa5fc3687ee628b8e336d7c57ecb6a34c1a7d3a1bc5f009d5e6a8d4ffadd76742f24d4f82c41047c6534d66166ccb5748929087b53d24caf7807d94e22d56ea6d139b32e925213e08536d28e5fa8aa6b0fc14df6b93132bf43b05858e6c9324795b71c1c37a59a087fc00995cc288499741c6f7a151cc52d7bcf1e4d1c019e8c350f9892517b4abbb078f1b651d9466868072dc1f5be9e6e17a0a33a2a282c2813bb52ec262498ebcc7efa25545816973ddf4506301a032bb82a824313c86118db1fa1e7bd955f3797771d4339748e3824879cc8d50289c889e929111d7291939e7489cc51db2f9afa0ec617d667f88e114bb1a9b6f8ce3b3552401543b38fd1764c913a8d4f72cd316974db943e6e583534768d08ab4c9796b4fd2ae3fd5bb49cc232d6a6b4b8"}], 0x1048}, 0x8}, {{&(0x7f0000001940)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @local}, 0x0, 0x1}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000019c0)="de72d78db9d39e0e5ada84e739cfe043675809c4bf317452ced0d4f2ed23e1b0b405b0380a00501973612a31c56664027fda3e1650faf787d6a023957d566530673ee85df6535288ffd6ac8e72813b20c13867b9ead79795dbe29eb3ebdb578a6c60d7c062", 0x65}, {&(0x7f0000001a40)="44d972654befbd5936a0b521766bbc6abaab4e087f834fc6ddb5d6fcf67bcc2017145911bb8c212df5b662142d43f82e5ecec69533d22a544428eaf4d952d4ab011347db48f14ea3820ced90295a503ce7f540156fdad3697df25d05c1da8a779ff8716c32554f8860a271c864d5f9b637e5a69858779c1eab414af681194e0047401af460a3b308125af75f8e6123ca107a1cb4cf363654cb366854762eab7836f7a8f8fcf8cfe93ca4f1a3f7ee9545e2fb96e4e7d72e4bd0b653e73a33619927c7fc16f76a89", 0xc7}, {&(0x7f0000001b40)="6b7cee7f8a7922eeb5fc7e75df6bdccdfd1485f6cc", 0x15}, {&(0x7f0000001b80)="3375a85d", 0x4}], 0x4, &(0x7f0000001c00)=[{0x108, 0x111, 0x6, "8fdec131c5ec781a1e31eb326c4eb2f719444ef35b1893012cff44fccf7537beee8f2a786b8d7783bcb7c003a1cb034dfcc9523b33c7b79307af435ee3d44dd90917af2aa3c1d130e18b415657b4814af5ea2e1f9fa84e697d420a708fb3f0074461df73a97826c51fb6f2413570deceb3d675a7724a86c02bd194f9ff111468cd74f6fbdf39b272bfe35af8736d3f033682c8f272aae5c218b1ee0f2a99b2f0f712c29bd80648279eabee5fd7705c4b076b279c68a0c8a6cba6c2ce63dfeec4ff5345948e84e76787eefeab8a5777b9a14b9cf7863620fcd3b3b163417bff8d15696074043a7fb219c88a68d132c212e5f50ed51e"}, {0x60, 0x114, 0x80, "d973615cc2ba0fda835764a570bcee5adcc9ada2742c4481dfdd6360843b1e86ea07682fa3101d433a3700951542d762f0b4f58e7bea68b69a0db1b78a786c26e2791fb86b9a06a0f0fd0295"}, {0x110, 0x10e, 0x1f, "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"}, {0xd0, 0x103, 0x100000000, "d83ad829ad5ed7c37f196ad4fed0269e2ab0644cd4229e3c0d36256edc6dd970927bf29708bc2a4363d692a898c47aaf3d18f52a6d8c8c25e3070c01812f3567f02f852ab4a3d9f905d1a0c7437d06a71d32f1c789f49c95205011c1629476ab33f15aabb2ad8a652031ecaa093ab07a8d1972d51eb8448ca6bef74085805e5a6ba6d4262d88cdcf60e53c89e43766a2c574a01aed35e3fbf4911ce163f7991679b32c4411e51ac53e33220007011f8f2db44aee5095e5f2907927f40c"}, {0x110, 0x0, 0x2, "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"}, {0x88, 0x19f, 0xfff, "88928f815e549315d2598a78350a181ae2dafc13bb8d9211d28cc03beee77cfac56b6ab012cbadb36d31fb9465be8400d40e2b44572c7e2e2e991465c68e428f8923da1c567aa661b9686eb4ad7907922e2f0f60c2f62abec0a25945417125b1142ae03d31f259bd1fdc60f7c41de7c247e8ba86"}, {0x68, 0x13f, 0x100000000, "7cedc288ed9cc39bd4c6cdda4e2b68e6daeb6f0edbe1b90d1cff0bfb7e01378a6973c3f17ad4af60d3d46568e49b8eb95826b2eb4bf5656173d60688b44d0fe378174f628f85af15e0e3b227d59a2568eaa9ca0c07dc6de6"}, {0xc8, 0x118, 0x100000000, "605ee7a10462f01d4d9f9f634a492de321360f7d8a299facf8ce39bbb088ec574ac1c220b7eadb2b5703227942c8f8cd4e1c95166e10b3f853b03f009e772c98cbf45deeef7e1955981efb011c42985fc274bc59ca0e50da727c9ae19778e45bfffb5442b413e1ed3034ec3236ce73c7ab2500c8f659d2286827e5bf4ca0e9847f98978c02ad6ee675f6be9e36a10a3210e15554db559b89fa11996f9303c59c8fcb338d6b3596d93da11fbf4e7b080a07e7e36af8"}, {0x70, 0x0, 0x6, "0da7f0564907bdffccafde7eaee95d0e1105bcef5e180f8310bb3b8777b171927fb879bf5104fcca86b767e1606c25e280eb81512c894f4590817a42e752729beb4f8657378b92811d1dd9f7ba173a256b84f66726f7faba8dbcc4b2eb6afe"}], 0x680}, 0x100}, {{&(0x7f0000002280)=@in6={0xa, 0x4e21, 0x100, @local, 0x1}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002300)="76b4af97fa9fb5ba8d33fb0899a36f56efb85993c1ef852e933ea081264a8cea73bd1177ff7a659a1c9b793f070099001e62c0e196ce07b73da5706e8f887f470928fe3fe03018e2d834cf3b24b478d11f2daabf6e801486c819d99787c26c52a3d206c7769fd954b063c6ce513e179ec19cd9025559761cf55971f6941bc62107e376bfb560eb", 0x87}, {&(0x7f00000023c0)="ef6cb4e430b6a50166ed31c76eb8d229acec0f7008a67deb71fd810d45db576bca42ad33e0c1a9d937f0708cb6793def72d2a164b9e813a509d81e14c85e16126bcfa6abce2c5e0bf92b671044", 0x4d}], 0x2, &(0x7f0000002480)=[{0x1010, 0x101, 0xffffffff, "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"}], 0x1010}, 0x78}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f00000034c0)="4bc2eaf4d7d6d6a129971ba27faa9f3f1fc4d9a6d667122746e69c22bc1bf594e6c35b545db4904991af6554451d57a40d439327ffbda676690620ec9b48b764442a6e06407f892f9dddd480a19311b22d37aaebeacf31343830b0b9b188ad7a02310e73", 0x64}, {&(0x7f0000003540)="338e6751b4f4361ce0a211f9454e9baf1fc2a2a10604619e8aa63ffbd3f5819db2708c41a7af9949ae80b10fe7e01563e91e1e818f72f05e7b02208438ecad168cad88bc32edd15b21db045393058089e3c0e02e1726a659ec36c4c0ef20ed43d3e35b0878326d9f2545e02036adca75ca8a28f1e6b825fa18f845bcfcc81afc0ce96ae07c5133a9cf7afd4cdf29b01ee5b59068694f0c", 0x97}], 0x2, &(0x7f0000003640)=[{0x38, 0x0, 0x755, "af438c8742296f3d68f07479c82163107d632b2a4e42a2f602ef3bfe97b0fdcf418ae92324"}, {0x10, 0x84, 0x9}], 0x48}, 0xffffffffffff8001}, {{0x0, 0x0, &(0x7f0000005900)=[{&(0x7f00000036c0)="115b3f159af87ead50498d3b99b7025bbafb6a593046fff70062267b60172a1eb16d5728db6af4b9d90c9923509f54ab1d584d34d61aeccfa56fdd35a745f6c354418a94f229816a6cac2c9a01be5f07a59e9311e356a9f5f24c5baf963bbcd0158269487a2360e598953544e7763a36ed31822addd82352901998e4afd04cb9e2d38983a51ea36bbbcfb54809dcf10348b1554263e74af4f7a0eab6a10f10d0fc7f67f9d0a2dd5a22976d62a80e8b0a3994f7e4a6edc3003f51ba85489abc9d16bc3910b48e703ce0eb00d2536555943c98442c51560e76d6cc024d62385ecff3e1ae402c631eea83e9758eb50e01af2e7b031a8e50116a66", 0xf9}, {&(0x7f00000037c0)="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", 0x1000}, {&(0x7f00000047c0)="e8258428044b2fe986425ea449245a7a4e770a16247d499f2895b2d6120edf98176da814014ae0fe43a7ce8f0462214a162ec815b821dca0bf618a9ee3741d72f863af9178ddadea6b76789262e1daa6115072b8057a3c0450b07dd424df445bbffa9a9dcdb1b954352fea5abcdd9ab9564c0dfc59e6e63bb2d9db061382f11e1ee9c6ba5e9cf739ad90890c80fd142ffe9d286f21ec5e9a0243b2a354f2a0bd837dafdcd9f15e200893f543db4ec3552e51bee88bb64aeb09e7eb8091", 0xbd}, {&(0x7f0000004880)="1285b743cd1ffd242758b93bd0a59b2ad811191fab5f4ca6f351df6907ab9f42fdb7f0e6c7ce873332b6d48e211904b14660d37bf889484faf5fdf48cae10711fbde6b15726c4675732f9832cc2b7a131c8b019ce817a77e5c20827df31d3597e78d6cc158c6205de6c0cbdf9d6257489903b010006213208abd57c039a1fcf7f21ab0a7128fbd1e3749c4ee2cc9184cebf74af90e16f0538bd9a95c0e4917dc672502b91422c49a431a32caa74a94fd2bfc1f3f03cea38970daa013b3b6b1d6caf419d530ef95439a0a7261f2b6aea4af8931ebf6cde2316a5fe141e15861adcbbfb506b62f2c8d35284ed4969677302c38e1273332fb41809b6d9ac230f8ed080b9d7a506785926e288805a8c618522f649b800c28ad9e2f72205200de8fd3d7a0a938672b4d22f86f8836e4cf938277db779c83f84618d692139123b91db2e9c0b09543882e9ac2ff39af046c67192a01f6e2c79466018c54076bda1840999f9b60522594fb9ee0ef5b69418ba22c6ac92428fedc26a3c52e03fb50525a8f71b9ca5c0395a9296d150c7ed89336dcdd67eb5b7f529c8b8f17bc3a226f86017270204e453d007695e97ef28168c46554723c26365ec1ed30f5f145d887e2ac6ad411208ae3cde6313e69a576d401c8059209d2f60c9055a424a955d51028a6075f1baac9a3b74da8e2f14322bcff72fd3e78ba80f2347c3eb3fd73b3dbf1362ac6d5aed8ec8630706af629785dea4e391608f66036a2386c492f9b8799e5373cf61efa1d03625b2eb97ea050150e8e71000fcb25c6c64f66aa13dc29848c16ff26b7508de1194eabccd5eee0e70f4c03a8a83b4b8e733882ae7fcbbb3b6b7a9ee244c302c4b98d59458fd810764319abb8bb0bb1723aeef0bf586214e1ce9fe45ab0ecf68510585a99bc24155504a0ef4535c2e64ce459884d5ed760dfa431ba497c5ec7c6c80fbb284a88659d82a28c740c0866edbc5c9717667210b700abf2c03394ed57bba8adfbd58fa72fd07caf1be411839e0458a388fea34772ccf3e3b63a1c62b42ac89f6912d51eee5d139e515929c0baf74327513f008d39986798fff78cdc458d7796717da5bd47d81d324a06d87d7b76f70b117da9e02933b44253eb39e6f67a3d42deaa2152353d94c16ee215c8ff35ccbb0ffa60f9b1c2d94e2606c6fa5154fc78b57fa973a0b4b84fe04eea82892399ea1867981fd8d41858a122f8a2d120e1600ab32791d48e9bdf3a6251ecaf63e8ff7a9890b6a0491bb955f12337fe95335e78f63c32a863457b5bf733e53c9ee7ea6d2be0de3207ee609fda794b14e6a758c2fc6243c8f8cf33b02c44f32ec85463c29324a1a636223eedc6329d618c9c4cf281a8feb2e36b7517e8317113fb81d6b1f725e102be42367a78e8a62dc7726eb007d6377d4ea95acf11ba6ffe3fbae05ba43544a4f0d084bea09f67c0318d2ca644c169529eecd9d4262eeb9e32bd6d87b6562d9ff343f1436a91bc4b62a83575b6f37ee1f239474c26e245764c1e61ec3380327bdc45f4dc18abb9804cddafad531c1cf924bf17c6e087b92ecd92af7528328465d7df7f248f26d709ba9403e042dff50a270e2e6098832f45098c2b8fa63bc1760bcb91fe3480554f0a91a27e1ae8a5c42eba1bc92016e9fe4efbde715520c1bfbf626c32ab8515fe8b4ab4c05c0bc7ee7e0b9609db2607be4d6855d88db79eae4396b177742e09acbb2199f39aa39ae4bfe2dbfaf878a4d8507c5ca4559689cc52c7c52504dfb7826c551b93d50c7ae5a2ae876b3d5e348b8650bfcc8768b6dbaf09f3d72dd980370efae22ae409d3c7477c4490c7068c231dc8a5931854786afe91ad0c691385a746e0b942165e86fd1ca35ed555ee2fc0a305303418fd664ad4d5ef82688896703feb8874c1526f8f8f7a964e06d966b0c3732fefade156b560bdbf0f53bdcc47a563032d1be57a5d820a2a86fd0da24e00c5a5818a220929bf6a611a997e7aa9834b6bd5b1f871ff0bcd397413fc7f8a1cc6a19cdf149a689e7de022901b673efac7b05d1ac9c076780e43ba1d2e0e389875631b587ce49b06d6acb8027ef727a0ad7309001f8c2d4a22d114c961de6c95bb9b32845043e4007837cc1d3077390baff553e1883eec12cd23bd58e91b566957c34673b43f82d3034e62e488731b32df12bb2fca30aeabe2ba201b2107488b71bd764f85af0ae985690bc3656818c069bb263c16075cd573a9963eda2781281d91b068f760453f521ed6bdfb1bf63211b6380b4f7bb4f42fa4013cd787d62b1f462caa06f65f5f133936ed6d99973df01973b01633f5a13a91e63e3e5bff0413ebb98448856ea0734e9517b95805f6363a5c750904fb6306b688fcdff5c6c8e4379f56e3734d4400a95120cc7ccb68cc73f5b9fc0dbe28b643c1a9494935d0aa3dd98f9f2e9856f833d2e1f438c8cd9c56a5fa4e860baa3537443c32c401b4cb3d1945c19698f8db2005941eb0e9fe373ab61b2a15729e1b4257e2072ec635e9204b73a348fe4f7f00cf426de8a6a01d171f523ba3bd8d6a0d2a89eb47c08488b7a073ce7973455d5a2e4e25cdc36a25655719ea6a6fecc4806283673db9951d0e11bcc5e35a249b98ae75f65c94d643b067bce3dd03f4c7be5b35f287a147f1de3da0c12b2abee707d2dabc0f95d10e4a2b367dcd3ddba4a4013d7991b75fe28432c8288131874f46fbf9c4e5a2dfbe5502180a45a211ff48a3834779fb0b276a535adb53d8d052881f11935034b15159f9f1c57303c8db4eb02a867d403f98bb20d60fb16e7be7c5977f7590ef99d4d758bf0afdb0a2807e30df8442388d731de1c8037745760b4fd1c3b6db474c1fa1ee12b6c1a265314f340214a9cdaf9fd31acab592b3ef7f3dd2724a45298de6463b143419c00c92391dfd50a6801c0339709b37d6a994392210a88113e76ef891b8c0fffbc495167223902d91627f0657e9a85dce6ae723919d92faa149688a70f099fbb2f5284758f198914cc6eb9989241bfb65b107422aa2e3a80db98059ac0e08d170d70c780823f3e1059a078e8499b1e587b7c345af6766a59252211b09c048d08556a531e585d521450ebf716ebefa784f85f42fd6069f9e3dac0dc16075a2d59048087554c4f7986a7b54f77d04ffe824d31602123b1ec41dba30590b6b370a0553a80dcd03d6db759503848e5ca044789e24f01596ea378a396ec8cf93eaccffdb4c2c944bb0b97ca42b84bef7d2860405a20f826f007ee0129922958d16d874ba693341e61cbc7f16d3cabfd6db43cc6fb83f641b123519741c73a833be224380dfcb7e5e426c82c8b3ab12d6795698f39fb61c074241168f9ab9bc7213becf6d862a7a73a5c1c1d73388d5e493e2f9027428169a5f8037ece302b9dc5fbeb9f31b156cb38e2b68924138fa20dd8244b53466a75748c1a570c06ce69e831c55737c44a833cfa45e276f302cc5862b2aa9f13edf5a7b32b51b5170d82ba1d77c444cb38b0bf82640859decfe0037ceff4f3010472e81062d3b8a9e23b381cc260077ba034fb5af7c7d9db48cd494b83c8ca3ef09c7c7bc7d54535986a666e6e6899d6c9399dd63339560d91b2a6f3ea5cf2dd54ca5df01ee2df5857eb0bd4589cce1f0bfadf67ebe1faa54426c9dc846f0a22fcac15cacac18eaab227ee0d8f46ff0377044a0556ea7e73a5570373667b98c2e9c41151eb3cfe7559a248d3bf8fd24efea1e1beb0ec52f6ed48728a572bfedc3fdedbeebea4ebd7ac3ea19aca20694ae4614eb060154ef1c72541336684e2d3e251435a213d68ad3f0bb20d946dacca78a3884da24247617558ffc52863d960de13b2e70edc6b1e020c6c1392153f04a3077ecc7f8a1b5db94f4270789848676556eb406dfc0df4afb07d1a7a50cc838333b1087a134ca0e37d4990984e94627216af447029d98a675d4a5190ee1bd8874dee90cca3dc5c217801fb66bdbb9747333381b104156c04ebe000086ad45819a433e497c422573897d98e218a0cef32bdd711339ef79b6c07a76a21ceefe7033a19cd142af9d7807c3c35876185f06cd5a7b2b8edd6fb7cd3f3d3711b3e5217a4dfa91c2df54a64d6cab91419a0ca75feb9cfbfda8e7c4fbea609d60dcf22faa19aa3e02bd197d509f2de51c5b46f9ca5949047a1dc89850317756b74819ab9d6781b76ac6829caa6a11b8cce691e8aecc799a69bede338a694dccc00d67118187fcef47204f87c5b3a8bb3b957c06e48ff823b4dca36eb7f4b2e0faa499f32ae49a1c9821f9d96ad889165dda726f8f7bfcb5f761a1b1adbbf0ee7d002dee5af00e526e71cdc56cfb00d0c2001f9de3f0109f281bae9dedb8589bfab78f44806b5978a0ad2d55c1858cff4fb6bd8cb01b4a6b8506e048270b4abee3905ad242e18ded90d6a3058a5432b22fbfdd0738fb5d1a269608241f6ea9aae21485f39faabdafc0efb68be13d7ee2063f8832c65a4ee8beb865d2570ab1355e228bcb5455695b1ba7fc2a3198b3a68e030bbdf007c65656ec693cfc317721540d92b63d6baeb8ac61581d098868de104476b6edb2863487521b1cc137a50ab5f1d57b06c9b7885f992db2bbb30fc08badd164ff3f73e73d059a1372de604bc2cf44c21bd096f978a3f916c3cb2a1b2e27e3be086086adf323f5e9948ab1cff02981fca7135520d96d79f740a90e772b140d0f2a8861fc192052ed8c2e342123b34a4f15cfb80840ddf6439214c0e11f812ee4b3347239397ff8295c932d320b17eef1c8c0a3eba04f15181cc115cea829b77c3c37288f8a297d18da2f6d4194ec4752e622072758eb581fa43e2414869b88f826d7c5cef017b00549e13d04904bc1237504a3cb2be42cef50efedcad52d15b7a9c668a34a955dbca4a73bcf958c743f5e8dd80805f46570ffbf89ed3ab4136010b9963d951b19265c46bf7992f665f104e8434913dbf968886cc9e6a5c1993566a3c5b530475e299d1b51709c7edd7b7da97d75a55782ebb2a0c37ca608c90e1c64d51017403c4a483a22e16348d280268917f07475c09f54a6437eb6821230c921adbfdfb7a104608e75ce8493258e972677a91d68a817a135ea70b79fba2fdf0df36ce5e44bae3744f5ba86b97459c94d510b5b32596201e6a98a0d7e877e6dc4769a4d4100c2d40daf92ced618116d4b89970158eeea14db003042b38a2b42f6c13043068945d8fdda1fcc15e009648050667b1e6c728bd6e18dbb4ed8713ebf7028d20b2c53fa9aaed05a30ff589836b3f97aee9be811d75a6a8f7394ac3abba7ff9f0e1884dea86a6c02bfa7b30ace68562c4ba6fa63db28c6b91b282c4b53d1020179ad50733aa22708308ded8bd0ffe15d2d718fc150c2df73a73bcd8344ffd4620e937e1c29c2188939be0679ca1d81726f5d45d2b0183225daffc032adbe9e428f9181d7f9b0f8708cfd19fa81a90d590c6a5cb86f4e007c55f824ce0a0eb5aeb87b1af50180ac40fb62d50075076c10defa0e79626023e169787cb94ffa452f501ceeedb3b69ab38f7b2f91c3e55008c638416be384dba6dce6429acf47a3b854467a1849fd23e38d039ffbfbff010d39491b5a98dffaa1fafa933ed6ba89e57347c905b808eda5aa3fa032e2ab1178e8244914106956f911ac3b8fc1c63e22f70776187f19ee57d7c57ace41e300eaf72ebdc303bcf0088bb7ce8bd09c596ddd51f0dca1dfb9127a3e9d31ee1ffce62d68fe3f600477541ee836b3f4744a76bbea1637fd20576be7e69a5b5b4d05c9c77f923ea617fccc9d99ce", 0x1000}, {&(0x7f0000005880)="b29d8c95ba8c92", 0x7}, {&(0x7f00000058c0)="8bcb04a876f6d27a3bf81aeea0e056ba09c164bdbf36d954b735077709dfeb7f59d175ce4b7fb30c", 0x28}], 0x6, &(0x7f0000005980)=[{0x98, 0x9daa0f274cf1dc60, 0x8, "1eac4c2842489b44c36cb4e99f06d1406ebaeff0709431326c1cc5bf44503f83c408a9cb99d0e1b1086fcc6a7d691278640b606be8af02b9b5c29dbde3adee67e4e559e881604f5365b31554c3e190e215bc3fd649afae42166b2d28ac65a87cf85379aaf856c4a2382c11231a861958c79710e21b5118af5ca2e102087190722606743d06bb"}, {0x28, 0x29, 0x6, "77da4fdcc6bd2f9b07ebec7d5da217f10813816398ee305f"}, {0x100, 0x112, 0xfffffffffffff6ee, "9167afcb00942056025aec13e14c5d3aa81219bb7450a39d276634fe4486f996b559e3c650b716577978f84b288c6c5491c8e98647f74c35bca19307c547f75839e85392bb2754bacd20e1c1a0afc0577dd20860720f83495757f98e0a92fbf361ce6a9e6c741c4cc47083fe4c71c76a4529a2f81adfb9c5f94ddcd1720583081fe12e5e67f1388877c8271d877b61e930aef9b02572bd59b45a78c3e06761e3c17334ce2b920d13dcd51165d92dc4fd6549f5a5e65cba704bf884be8cba16dbdba049141254bee9cebc101bdd8bfa654f3c93e9a680fd0471927f605090989f9a97c483007bd3f308651c8bbfa3"}, {0x40, 0x139, 0x3, "5d957302442a71558f064133a60fe53f88bc7a0880bf86917a6362390245e4419f1061f7991aa57342dc7439"}, {0x80, 0x110, 0x4, "6b5e04eee80577765f26b326cccc59091c076e7eaa41a906174ff1dc7ef47991543a795582b007d3e9a94032ed666f799fa5f941ce93510af58624c51e8d1d0cf6f569701c924296eabff76660674b9be4abba7e9c79fcd3a193067a7d8ce80a618830ddbf84082ad458c0b5361b"}, {0x18, 0x115, 0x7, "c5eb23b0fd2885"}], 0x298}, 0xcd3}], 0x5, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:58:01 executing program 2: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:58:01 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x2000000}], 0x8008, 0xffffffffffffffff) 08:58:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:01 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x204, 0x0) 08:58:01 executing program 2: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) [ 1068.272661][T20352] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1068.297211][T20359] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:02 executing program 2: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:58:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x3000000}], 0x8008, 0xffffffffffffffff) [ 1068.515223][T20370] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1068.553997][T20370] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:02 executing program 2: r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:58:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x6c00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:58:02 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x5) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:58:02 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000000)={0x0, 0x7bc, 0x7, 0x1, 0x2, [{0x80, 0x3ff, 0x9, 0x0, 0x0, 0x100}, {0x4, 0x4, 0x1, 0x0, 0x0, 0x2901}]}) setsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f00000000c0)=0x1, 0x4) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:58:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x4000000}], 0x8008, 0xffffffffffffffff) 08:58:02 executing program 2: r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) [ 1068.831769][T20391] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1068.857834][T20391] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:02 executing program 2: r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:58:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x5000000}], 0x8008, 0xffffffffffffffff) 08:58:02 executing program 2: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) [ 1069.070399][T20411] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1069.106432][T20413] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7400000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:58:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:02 executing program 2: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:58:02 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x600480, 0x0) write$selinux_context(r0, &(0x7f0000000040)='system_u:object_r:pam_var_run_t:s0\x00', 0x23) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd56) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 08:58:02 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x6000000}], 0x8008, 0xffffffffffffffff) 08:58:03 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="79282bbaa11d68cf492b048ef4c09a99ac5cb69e5828029b164e923220833226166662486c8c7a849764ab4620729d2065882144f953cd140db4dbbfa4bd68c4b4b69ab4d280ea1abea0eedda802465949b305e3298237f7c6ee6df771bc6a39ba88074d4b94a85f31a18f76ebcc92191ed4abfda094a12366e320c037af33d78d19c3f8cf099e5b4f273a932ef4276db42719e5dc82411116de76d2874b9a604bfa6f7f3acdae5108a54b5ceb99222456d557df662205ee1a92ff2ed5632555125903f2b5722e8fd34aa0fed292ddc4724ab55ea50aeec0121265e041a4c6591f1f0eb3c736d49e2c78b9a2ec16b75e3544b7509abea50e", 0xf8, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="0380ad315352c15b432f03668ca2016daf7600c0f196b41918231628d377f02c768de13001032a40fa6f96ff4c3fd3e291d20bcd7408ab6be6e95354f9ddd5f54961f6a255d6964d3291ae26d76cba02dfd1564e9caa906bde9cc2", 0x5b, 0x0) r3 = request_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='hash\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400)={r1, r2, r3}, &(0x7f0000000440)=""/196, 0xc4, &(0x7f0000000640)={&(0x7f0000000540)={'nhpoly1305-avx2\x00'}, &(0x7f0000000580)="f1a7fd54d0723b13b11d1456d0babfb68ba0f295cd24280235335011d92c2b54e811a4097c40429897ab9d6dbae9c383a8757b3966948bf5ff090dc00bf70111fc5fa640f86e646ae162df9308c463a1c990ee58687da6335970af171c36357dc80a16321bf2cec7bb49ae281a57eb7ef8ffc4fbdea7fdd5e2c3c8b7c78d2c6e14d729b24e80bc1696d3c1e848bd", 0x8e}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 08:58:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:03 executing program 2: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000000c0)={0x4, @sdr}) 08:58:03 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x7000000}], 0x8008, 0xffffffffffffffff) 08:58:03 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x2, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000001c0)={0x3, 0x3, 0x100000000, 'queue0\x00', 0x4}) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffffffffffffff00, 0x8080) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd56) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) connect$ax25(r5, &(0x7f0000000000)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @default]}, 0x15f) flock(r2, 0x1) 08:58:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) 08:58:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1071.016021][ T8970] device bridge_slave_1 left promiscuous mode [ 1071.022215][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.076210][ T8970] device bridge_slave_0 left promiscuous mode [ 1071.082532][ T8970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.827978][ T8970] device hsr_slave_1 left promiscuous mode [ 1072.870679][ T8970] device hsr_slave_0 left promiscuous mode [ 1072.929861][ T8970] team0 (unregistering): Port device team_slave_1 removed [ 1072.941846][ T8970] team0 (unregistering): Port device team_slave_0 removed [ 1072.953485][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1073.010705][ T8970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1073.116834][ T8970] bond0 (unregistering): Released all slaves [ 1073.231162][T20488] IPVS: ftp: loaded support on port[0] = 21 [ 1073.303144][T20488] chnl_net:caif_netlink_parms(): no params data found [ 1073.342674][T20488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.349859][T20488] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.357991][T20488] device bridge_slave_0 entered promiscuous mode [ 1073.366082][T20488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.373149][T20488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.381014][T20488] device bridge_slave_1 entered promiscuous mode [ 1073.397977][T20488] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1073.410795][T20488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1073.433908][T20488] team0: Port device team_slave_0 added [ 1073.443000][T20488] team0: Port device team_slave_1 added [ 1073.520187][T20488] device hsr_slave_0 entered promiscuous mode [ 1073.575479][T20488] device hsr_slave_1 entered promiscuous mode [ 1073.728003][T20488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.735129][T20488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1073.742458][T20488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.749554][T20488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1073.813962][T20488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1073.835443][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1073.850476][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.860449][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.881350][T20488] 8021q: adding VLAN 0 to HW filter on device team0 [ 1073.899880][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1073.914948][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.922070][T14781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1073.951994][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1073.962726][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.969850][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1074.003692][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1074.013580][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1074.028721][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1074.043227][T20488] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1074.065356][T20488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1074.073372][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1074.089113][ T1042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1074.120698][T20488] 8021q: adding VLAN 0 to HW filter on device batadv0 08:58:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x7a00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:58:07 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x8000000}], 0x8008, 0xffffffffffffffff) 08:58:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) 08:58:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x80000000002a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @rand_addr="2c1cccabb953372891802a713fa5e925", 0x0, 0x0, 0x0, 0x800000000119}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 08:58:07 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:58:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) [ 1074.342816][T20503] EXT4-fs: 6 callbacks suppressed [ 1074.342862][T20503] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:08 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x80000000002a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @rand_addr="2c1cccabb953372891802a713fa5e925", 0x0, 0x0, 0x0, 0x800000000119}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 1074.413071][T20503] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x0, @sdr}) 08:58:08 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0x9000000}], 0x8008, 0xffffffffffffffff) 08:58:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x0, @sdr}) [ 1074.766450][T20535] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1074.785439][T20539] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) mount$fuse(0x8cffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0xc000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VT_ACTIVATE(r0, 0x5606, 0x67) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xbb, "d5bbe9c7453a35584876ed29d08f9e2874c8fdfee019b26c5ff6516e8260a40473b15b7883980f916f5deceab49a2c78c3e5afb0af5f11374ce25348cd8eb653af0c6cd31f7e5615d604995073305694f57c2a83f6595bdc6dbdad89697b79d7fdb64de027af2ca9e16a6ccf78d9438767b37e7c60aad11d8863d5acb4feb8526f9c115df9efc4a149caf0a408a494f04157428285a333819c39c991b9d18b73b24e5cd2e22492482b8873052406ecc95e14fc724fa26541b3bbf0"}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xbb, "5023454ee63a1299971e1300437b8ff1df43a775c3b3c19485abd3a7ee271500617cbcf8ed272d5cd1f6f24baff867280b4132daa18359be4ec0a118b3fcfde978aa99476db9b94e4227101b3911a07913212088b14679122bed4d09b1beaf6f18ffa2f2fff685d5a6bf7debed131725040d7ce67c591e0f6594b4c4a34a0ef8f600f94671eacd896c77cc032abde1e82b65f9443564c5e600837de9e5dcf95737ce1c24609d4973aaab83c5e863170bdf3d316cff8a82ec9c76a1"}, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:58:08 executing program 1: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd56) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) eventfd(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 08:58:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x0, @sdr}) 08:58:08 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xa000000}], 0x8008, 0xffffffffffffffff) 08:58:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 08:58:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) [ 1075.063454][T20549] EXT4-fs (sda1): re-mounted. Opts: (null) 08:58:08 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa, 0xb000000}], 0x8008, 0xffffffffffffffff) [ 1075.127634][T20549] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1075.199841][T20557] kasan: CONFIG_KASAN_INLINE enabled [ 1075.215090][T20557] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1075.243408][T20557] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1075.250479][T20557] CPU: 1 PID: 20557 Comm: syz-executor.2 Not tainted 5.0.0+ #26 [ 1075.258101][T20557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.268238][T20557] RIP: 0010:ebitmap_destroy+0x32/0xf0 [ 1075.273707][T20557] Code: 49 89 fd 41 54 53 e8 9d d2 7f fe 4d 85 ed 0f 84 99 00 00 00 e8 8f d2 7f fe 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 98 00 00 00 49 be 00 00 00 00 00 fc ff df 4d 8b [ 1075.293571][T20557] RSP: 0018:ffff888094da78c8 EFLAGS: 00010202 [ 1075.299812][T20557] RAX: dffffc0000000000 RBX: ffff88807c7d61e8 RCX: ffffc9001053d000 [ 1075.308025][T20557] RDX: 0000000000000002 RSI: ffffffff82f09d01 RDI: 0000000000000010 [ 1075.316101][T20557] RBP: ffff888094da78e8 R08: ffff888088622640 R09: ffff888088622f30 [ 1075.328159][T20557] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 1075.336123][T20557] R13: 0000000000000010 R14: ffffed100f8fac72 R15: 0000000000585838 [ 1075.344515][T20557] FS: 00007f4e57ea4700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1075.353443][T20557] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1075.360070][T20557] CR2: 00000000004ced50 CR3: 0000000053527000 CR4: 00000000001406e0 [ 1075.368023][T20557] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1075.376175][T20557] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1075.384136][T20557] Call Trace: [ 1075.387504][T20557] policydb_destroy+0x62c/0x7f0 [ 1075.392348][T20557] policydb_read+0xe27/0x52c0 [ 1075.397062][T20557] ? cond_index_bool+0x1a0/0x1a0 [ 1075.402077][T20557] ? string_to_av_perm+0xa0/0xa0 [ 1075.407133][T20557] ? xen_pcibk_config_read+0x460/0x750 [ 1075.412677][T20557] ? security_load_policy+0x185/0x1170 [ 1075.418171][T20557] ? rcu_read_lock_sched_held+0x110/0x130 [ 1075.423989][T20557] ? kmem_cache_alloc_trace+0x354/0x760 [ 1075.429544][T20557] security_load_policy+0x36d/0x1170 [ 1075.434833][T20557] ? security_change_sid+0x150/0x150 [ 1075.440247][T20557] ? find_held_lock+0x35/0x130 [ 1075.445037][T20557] ? __might_fault+0x12b/0x1e0 [ 1075.449910][T20557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1075.456187][T20557] ? _copy_from_user+0xdd/0x150 [ 1075.461193][T20557] sel_write_load+0x25a/0x470 [ 1075.465909][T20557] __vfs_write+0x8d/0x110 [ 1075.470240][T20557] ? sel_make_policy_nodes+0x1540/0x1540 [ 1075.475862][T20557] vfs_write+0x20c/0x580 [ 1075.480194][T20557] ksys_write+0xea/0x1f0 [ 1075.484680][T20557] ? __ia32_sys_read+0xb0/0xb0 [ 1075.489986][T20557] ? do_syscall_64+0x26/0x610 [ 1075.494707][T20557] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.500769][T20557] ? do_syscall_64+0x26/0x610 [ 1075.505632][T20557] __x64_sys_write+0x73/0xb0 [ 1075.510208][T20557] do_syscall_64+0x103/0x610 [ 1075.514881][T20557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.520850][T20557] RIP: 0033:0x458079 [ 1075.524734][T20557] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.544495][T20557] RSP: 002b:00007f4e57ea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1075.552887][T20557] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 1075.561022][T20557] RDX: 00000000000000b2 RSI: 0000000020000240 RDI: 0000000000000005 [ 1075.569073][T20557] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1075.577029][T20557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4e57ea46d4 [ 1075.585080][T20557] R13: 00000000004c7521 R14: 00000000004dd120 R15: 00000000ffffffff [ 1075.593659][T20557] Modules linked in: [ 1075.611010][T20557] ---[ end trace 04f0e2ab24915ec7 ]--- [ 1075.616773][T20557] RIP: 0010:ebitmap_destroy+0x32/0xf0 [ 1075.618490][T20561] kobject: 'loop0' (000000001e16a3e9): kobject_uevent_env [ 1075.622262][T20557] Code: 49 89 fd 41 54 53 e8 9d d2 7f fe 4d 85 ed 0f 84 99 00 00 00 e8 8f d2 7f fe 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 98 00 00 00 49 be 00 00 00 00 00 fc ff df 4d 8b [ 1075.650203][T20557] RSP: 0018:ffff888094da78c8 EFLAGS: 00010202 [ 1075.658882][T20557] RAX: dffffc0000000000 RBX: ffff88807c7d61e8 RCX: ffffc9001053d000 [ 1075.667271][T20557] RDX: 0000000000000002 RSI: ffffffff82f09d01 RDI: 0000000000000010 [ 1075.675432][T20557] RBP: ffff888094da78e8 R08: ffff888088622640 R09: ffff888088622f30 [ 1075.676988][T20561] kobject: 'loop0' (000000001e16a3e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1075.683567][T20557] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 1075.703264][T20557] R13: 0000000000000010 R14: ffffed100f8fac72 R15: 0000000000585838 [ 1075.715418][T20557] FS: 00007f4e57ea4700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1075.724595][T20557] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1075.734790][T20557] CR2: 0000000000625208 CR3: 0000000053527000 CR4: 00000000001406f0 [ 1075.743399][T20557] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1075.753565][T20557] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1075.754351][T20561] kobject: 'loop0' (000000001e16a3e9): kobject_uevent_env [ 1075.761705][T20557] Kernel panic - not syncing: Fatal exception [ 1075.763037][T20557] Kernel Offset: disabled [ 1075.780777][T20557] Rebooting in 86400 seconds..