, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000800)={0x8, [0xffff, 0x6, 0xfffffffeffffffff, 0x6, 0xffffffffffffffc0, 0x1, 0x1, 0x4]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1000002, 0x0) getresgid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff7fffffff, 0x6, &(0x7f0000000440)=[{&(0x7f0000000080)="0aeee47bca1cb98d3a229c85bd5fb1b45ebc8417a938830e6c8b8a02de45e97fa4efba28892691f86816bae700da4edbda302a67eb132d1c079ed7684e0a1541c17aa6e2642f4bb320beb8dc711b33dc2833d2efec6fa6a1312063c3a850c3c5ad987f78c788cb689b1f1ac45b572a8fb46cd49281ad8925a35a41c703ea4b15869c7b9dc646d676593aec35cff114b2bca010f7edfa06d85561460aa296031c84755508aa9d31082b7d", 0xaa, 0x9}, {&(0x7f0000000140)="3dd9f7eebd67188685493d13b70a3620b012010fcfc19a8bbe985db02d9bbdc431830ddd97d1b66b9cef1095df0755e4ee169a66e5a3977ca860586cfdc50ad92995a630f7499967a691fadb93412a6a75833dfd3636221c", 0x58, 0x5c3}, {&(0x7f00000001c0)="8879fbbdebd70d4d273f324a112044a6dea7b6a76d00caf543cd4ef4863e6a693b086b269c060d92785efa5b386786b5b723cbf634fcad4d09dfdea2c9cbaac0c0ccb2d251111446367acc6258e17377ea747bfbf4", 0x55, 0x8}, {&(0x7f0000000240)="7b74a3c9358e43f49c1443edcc703986f0551788e4a772f1706e393225c2355a412a768219dddeec900540a9c250e0f7d1468a0b10894a55c8b28c5062a8b125618b8f33b5f8fe4aabf9b3cc3f31debf", 0x50, 0xfff}, {&(0x7f00000002c0)="f30192e9c11eb8bcbf6ab5c53c1b86a568456c31f89765b7116f76742baa3543b7d48825d7a317b5d6247259d2276d21de481713ff1075fd965faaba7ae76fabd94a145565bc6c4219204608c8bfbd93653ccd4eb957838d0868d036743578807a5d34fe68a9499e894acabf5d02b9a0800753cc506263046be26208f8f96a12d083201d3fe46837555424a1995d4aac059590ba200f89acb7b0258bdc86400c74ae9a04952b80c015668a2123f88a687ff1a24d097463f46a2ecc535c1f3b5cb2cf2aeda7be156020807f", 0xcb, 0x3}, {&(0x7f00000003c0)="a18030d8771cbbd059e64828920d4fbd1d1bde84bd20051879f87f2fec86e8164ff8b26c76d2f90a07fa3ec366e5cb147728965b6d74e709cbd2c4d7ae802635c895d40d34", 0x45, 0xfffffffffffffc00}], 0x20004, &(0x7f0000000680)={[{@gid={'gid', 0x3d, r1}}, {@nointegrity='nointegrity'}, {@gid={'gid', 0x3d, r5}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'cpusetppp0\''}}]}) 01:41:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x23f6, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x80, 0x80800) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000240)={0x3, 0x3}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000100)=0x20, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x7}, 0x1c}}, 0x0) bind$pptp(r1, &(0x7f0000000280)={0x18, 0x2, {0xce}}, 0x1e) r4 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x82) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @dev, @local}, &(0x7f00000001c0)=0xc) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000200)=r5) 01:41:02 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/132}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 01:41:02 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000080)=0x401, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x7}, 0x1c}}, 0x0) [ 1767.973501][ T26] audit: type=1804 audit(1556761262.911:146): pid=25078 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir432751316/syzkaller.eQuxkB/1134/bus" dev="sda1" ino=17857 res=1 [ 1768.283892][ T26] audit: type=1804 audit(1556761263.221:147): pid=25078 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir432751316/syzkaller.eQuxkB/1134/bus" dev="sda1" ino=17857 res=1 01:41:03 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000280)='./bus/../file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000200)=@file={0x1, './bus\x00'}, 0x6e) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x2, 0x1, [0x5f0, 0x1f, 0x7ff, 0x6, 0x0, 0x4, 0x300000000000000, 0x10001]}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0xfffffffffffffee4) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f00000000c0)={0x2, 0xff}) socket$inet_dccp(0x2, 0x6, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) write$eventfd(r0, &(0x7f0000000040)=0x3, 0x8) 01:41:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3f00, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:03 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000340)=0xe8) setresuid(0xffffffffffffffff, r0, r1) r2 = geteuid() setfsuid(r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) 01:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x1000, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x7}, 0x1c}}, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x8000) ioctl$KVM_SET_TSS_ADDR(r4, 0xae47, 0xd000) 01:41:03 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = semget(0x2, 0x0, 0x40) r3 = geteuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000340)={{0x9, r3, r4, r5, r6, 0x100, 0x1400000000000}, 0x3, 0x5ae3, 0x4}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:03 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00040f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") [ 1768.311952][ T26] audit: type=1800 audit(1556761263.261:148): pid=25159 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17857 res=0 [ 1768.335130][ T26] audit: type=1800 audit(1556761263.261:149): pid=25078 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17857 res=0 01:41:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:03 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0xa, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$bt_hidp(0x1f, 0x3, 0x6) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x7}, 0x1c}}, 0x0) 01:41:03 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') ioctl(r1, 0x1000008912, &(0x7f0000000100)="0add1f1a3c0000319bd07055273b71a340f912a797b49f000001be1968132f359ffb909ecf48f1f1eb14d96eb8f95dc8137fbd7f5588eb282a0fb1a290992f02153ff72da00c99f68d26bc7ee8a794bb0ef72f39cc0400"/105) syz_execute_func(&(0x7f0000000180)="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") connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x2, 0x0, 0x2}}, 0x2e) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) 01:41:03 executing program 1: socket$vsock_dgram(0x28, 0x2, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r2 = dup2(r1, r0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x8) fcntl$getflags(r2, 0x3) geteuid() 01:41:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xc00e, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:03 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:03 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = fcntl$getown(r1, 0x9) fcntl$setown(r0, 0x8, r2) syz_execute_func(&(0x7f0000000180)="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") 01:41:03 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 01:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x7}, 0x1c}}, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) 01:41:03 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:03 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4200, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) setfsuid(r0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x3, 0x4) 01:41:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:03 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffd, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x180000000000, &(0x7f0000000680)="360900004c123f319bd070d8d9c9988c02eed6f278c69197eee53735cb18df4a624c2b43f19e52e89de012b87e9a70db1417a13a358675699b99446583681f5b70725413c46e43a318edd8e6986d12fa08dff639aa66c42513e18ec5f9216b4418914fd45a4d0fb05724ad97638d536b868079aa26cea3241580e065662275859da187775ede666d88c7c948da678d9f650db2b7841e3a6f88281c33175ef4f5e0debb51e9470f948dd4383f8d621e622a445696979bc57c28524328b0bc53a23bfdac2b356b3387f66197cc4e7fa56a33aaf01e6f16236babb364a30e") syz_execute_func(&(0x7f0000000540)="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") ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) 01:41:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7f, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x8010, r3, 0x4c) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x7}, 0x1c}}, 0x0) 01:41:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf623, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:04 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) prctl$PR_MCE_KILL_GET(0x22) geteuid() r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 01:41:04 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:04 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) accept4$netrom(r0, 0x0, &(0x7f0000000040), 0x80000) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:04 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x8, 0x20, 0x7f, 0x7, 0x1}, 0x14) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x34000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:04 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) r3 = geteuid() setresuid(r1, r2, r3) r4 = geteuid() r5 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000340)={{0x3, @bcast}, [@bcast, @null, @bcast, @null, @null, @null, @rose, @default]}, &(0x7f00000003c0)=0x48, 0x80000) recvmmsg(r5, &(0x7f0000000600)=[{{&(0x7f0000000400)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/61, 0x3d}], 0x1, &(0x7f0000000500)=""/249, 0xf9}, 0x80}], 0x1, 0x40012021, &(0x7f0000000640)={0x0, 0x989680}) setfsuid(r4) 01:41:04 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1769.547733][ T26] audit: type=1800 audit(1556761264.491:150): pid=25419 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17857 res=0 01:41:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:04 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) setfsuid(r0) 01:41:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x400300, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:04 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x5, @local, 0x5}}, 0x4, 0x1b}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x4a}, 0x8) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000500), 0x4) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3193d070") getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x401}}, 0x10001, 0x80000000}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000380)={r2, @in={{0x2, 0x4e23, @remote}}, 0x100, 0x800}, &(0x7f0000000080)=0x90) syz_execute_func(&(0x7f0000000180)="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") 01:41:04 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:05 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x9, 0x9, [0x2000000000000000, 0xffffffffffff7fff, 0x2, 0x401, 0x8a, 0x6, 0xfffffffffffffffb, 0x0, 0x10000]}, &(0x7f0000000200)=0x1a) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1, 0x7, 0x30}, &(0x7f0000000280)=0xc) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000000)={0x17}, 0x56) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r3, 0x0, r4, 0x0, 0x3, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r2, &(0x7f0000000340)={0x7}, 0x7) 01:41:05 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) prctl$PR_GET_FP_MODE(0x2e) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x18d1c0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x40000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@empty, @in6=@remote, 0x4e24, 0xff, 0x4e24, 0x8, 0xa, 0x80, 0x0, 0x3b, r2, r3}, {0xfffffffffffffffa, 0x2, 0x1, 0x3, 0x0, 0x8, 0x9, 0xff}, {0x100000000, 0x3, 0x9}, 0xff, 0x6e6bb5, 0x2, 0x0, 0x2, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x6c}, 0xa, @in6=@mcast1, 0x3501, 0x3, 0x2, 0x3, 0x3d07, 0xc5a, 0x7}}, 0xe8) r4 = geteuid() setfsuid(r4) 01:41:05 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd07058904bdcc7a3cbc8db38136f5357f9906a6dcf2fdf67930ad0d1983c8eeca76476f52e2425a36af61b4ed7842324dbbcbccc2851b21cea2c68769e61a1ac5322988b4e90b5fee26430d0") syz_execute_func(&(0x7f0000000180)="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") 01:41:05 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e230200000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:05 executing program 3 (fault-call:3 fault-nth:0): socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1770.274659][ T26] audit: type=1800 audit(1556761265.221:151): pid=25895 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16548 res=0 [ 1770.362839][T25912] FAULT_INJECTION: forcing a failure. [ 1770.362839][T25912] name failslab, interval 1, probability 0, space 0, times 0 01:41:05 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/mixer\x00', 0x200800, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3e45, 0x7, &(0x7f0000000580)=[{&(0x7f0000000080)="11cf4c90cc181ca5263e32cda319db08be0de6056694c3ff926e383da8e6a8a9da608c220a", 0x25, 0x5}, {&(0x7f00000000c0)="c8f3d529ec84065d321a9c58000940e4b2661801e7e5fdb7fe8085bb1a4ae1c5ebc470bb4cafac6f607c8ecb236d20dd5f79fe8e2fe234dd76e5e424d399f3381e7eec00d4fbcd0fe63337e00b900c0d2c596d0d328012e35c47a4dba7536b0735a4ba45b98f74b21a50ea0510ae6759b10acb24ddf26dfc0bee9a3d2524f0a86399d5222b2cdf7eb25c0b14151300e091ccf20b038fbb5ae6f0bac050077eb3f03bea364612635e66981b3a7a47b78e074ba08242e8be552414766d6770ed80db4aeeb88b9e5fa0ae0634ad3047b327275884275443e1db8856b0c79c439058fcb6cb7b59f749b1", 0xe8, 0x23}, {&(0x7f00000001c0)="f72f25c2a448c5bb4ad13c9bfd4b5229c30fd4bace2170596048a80f159a03f330c4d6499053cd11f90ce2639b477c151b746dde8b46f906edc20bd024c606ad11279d0cee309d3840f8353233855309c6a58a1c3700251d260e79f63d9afc3eccc83c76c6475526fead6f21eddbee6451dd84e253f3cddeb4d9826b33f15f6c791f", 0x82, 0x7ff}, {&(0x7f0000000280)="3d6fb3ed6a39cc0080937a0024943670c95d506876c446eaf25870cdeeed844ce02bed3f0a8862bda357d8b8ab1a0f66b5dacede62530f31d849d550ed921e655f89ee924a698d8401380058b3be434a83d4efdd30a2c5fbfebe6d6f45d409535a5ca22be5d83a2a6087af93d2b53a3ca82d41e66fd5b1620ee28ab90e8ff5ae4ef3fb487de03ca6e0dab945322e5ea2cb19744d2249dfda58cd4d850c35456f2ea3ebf107fe924c2f7b569b1127b35ff9ad4a8a551e40863c2b1c13122393e84902f16a1f88", 0xc6, 0xa10b}, {&(0x7f0000000380)="6a712d39b26f7feaa9590b8bad9775914a2662f014f5b5c17d237a6fc257ae7862d28d557d52c569e00af24d6370f4cd4df8dc23dc356b1815fd424e979a26335d4c136668c7fbe2b570f0e509b90909bd956ee662c51ae5bf68560026ce8fddec381a987796943eb53b35ff50f5b7b921e104831d98c8c14dfbf0a1d7982f14c7e29f9d158e6a766e350b464efb696f737d537606c5f128de3c1fcc51e81f665b3c33f7", 0xa4, 0x7}, {&(0x7f0000000440)="838c768a4327e031215a0cf7757140f05129c970f5058203941d627f8e9f2fde5aa89bc513b99a509811016b78b76efc8c41e276b6e2cb12498b26e7901156def1c2ee4fa389064640219a9a7d86ddcb6ed034fc6333df74614faddc8af3b9b0e10338db88efbc9af149862a4e0b19b26bd455a68a2b4e1993b4ea3f45154a35737ca4ba4ac0dfe7a9c9ea3151afd910df106e4018", 0x95, 0x1}, {&(0x7f0000000500)="5a48b2368347cdcc5ab9b156d90cf2e432e3db8e17f382b047a3bad43baf9f3be02d148e55ae95f07db8da9d6b76fc79e8318319e9d9d361eaaa804d7ea2860156a3", 0x42, 0x800}], 0x40000, &(0x7f0000000700)=ANY=[@ANYBLOB="6e6f626172726965722c62696f73697a653d30303030303030303030343239343936373239362c6c617a79746980652c7377616c6c6f632c636f6e746578743d757365725f752c736d61636b66736861743d766d6e657430776c616e31262c736d61636b66737472616e736d00010000402e2d2c657569643e", @ANYRESDEC=r0, @ANYBLOB=',smackfshat=keyringvboxnet1.em0,,obj_user=selftrustedsystem/keyring&,mask=MAY_APPEND,smackfsfloor=selinux#[,obj_type=\x00,audit,\x00']) ioctl$RTC_AIE_OFF(r1, 0x7002) r2 = geteuid() setfsuid(r2) r3 = syz_open_dev$dspn(&(0x7f0000000840)='/dev/dsp#\x00', 0x2, 0x208000) r4 = getpgrp(0x0) r5 = getgid() setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000880)={r4, r0, r5}, 0xc) 01:41:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x1000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1770.447374][T25912] CPU: 0 PID: 25912 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #95 [ 1770.455408][T25912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1770.465483][T25912] Call Trace: [ 1770.468832][T25912] dump_stack+0x172/0x1f0 [ 1770.473222][T25912] should_fail.cold+0xa/0x15 [ 1770.477850][T25912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1770.483685][T25912] ? ___might_sleep+0x163/0x280 [ 1770.488559][T25912] __should_failslab+0x121/0x190 [ 1770.493528][T25912] should_failslab+0x9/0x14 [ 1770.498041][T25912] kmem_cache_alloc+0x2b2/0x6f0 [ 1770.502915][T25912] locks_alloc_lock+0x1d/0x1d0 [ 1770.507697][T25912] lease_alloc+0x19/0x2c0 [ 1770.512081][T25912] fcntl_setlease+0xb5/0x240 [ 1770.516678][T25912] ? fcntl_getlease+0x500/0x500 [ 1770.521543][T25912] ? lock_downgrade+0x880/0x880 [ 1770.526413][T25912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1770.532703][T25912] ? kasan_check_read+0x11/0x20 [ 1770.537592][T25912] do_fcntl+0x8d5/0x1140 [ 1770.541855][T25912] ? f_getown+0xc0/0xc0 [ 1770.546031][T25912] ? __x64_sys_remap_file_pages+0x500/0x8e0 [ 1770.546046][T25912] ? __x64_sys_mq_open+0x16d/0x1f0 [ 1770.546062][T25912] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1770.546078][T25912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1770.546092][T25912] ? tomoyo_file_fcntl+0x70/0xc0 [ 1770.546106][T25912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1770.546121][T25912] ? security_file_fcntl+0x93/0xc0 [ 1770.546150][T25912] __x64_sys_fcntl+0x16d/0x1e0 [ 1770.557324][T25912] do_syscall_64+0x103/0x610 [ 1770.557346][T25912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1770.557358][T25912] RIP: 0033:0x2000018a [ 1770.557374][T25912] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 4a 2a e9 2c 18 96 4c 0f 05 03 00 00 00 c4 a3 7b f0 c5 1d 41 e2 e9 c4 22 e9 aa bb 3c 00 00 [ 1770.557382][T25912] RSP: 002b:00007f27264fabd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1770.557394][T25912] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000002000018a 01:41:05 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:05 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") write$P9_RFLUSH(r0, &(0x7f0000000140)={0x7, 0x6d, 0x2}, 0x7) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000100)=0x2b61) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 01:41:05 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fstat(r1, &(0x7f0000000040)) [ 1770.557402][T25912] RDX: 2f5949722bbc0de2 RSI: 0000000000000400 RDI: 0000000000000003 [ 1770.557410][T25912] RBP: 00000000000000fa R08: 0000000000000005 R09: 0000000000000006 [ 1770.557423][T25912] R10: 0000000000000007 R11: 0000000000000246 R12: 000000000000000b [ 1770.557431][T25912] R13: 000000000000000c R14: 000000000000000d R15: 0000000000000005 01:41:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:05 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:05 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020300000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:05 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x18a40, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200200, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000300)="c40179db2746058910ba61410f381d05c500000066baa100b0f9ee64410f2056f2de14feb805000000b9010000000f01c166ba4000ed45dec90fc75e00", 0x3d}], 0x1, 0x20, &(0x7f00000003c0), 0x0) mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000003c0)=0x9) write$FUSE_LSEEK(r2, &(0x7f0000000000)={0x17}, 0x56) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r3, 0x0, r4, 0x0, 0x3, 0x3) write$P9_RREADLINK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) sendmsg$tipc(r2, &(0x7f0000001940)={&(0x7f0000000400)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x2, 0x3}}, 0x10, &(0x7f00000017c0)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000440)="d9d2e9806c0c710710913e946075165fe1b8e79da008ae53ced86a230e6bf29c705b2c1ec22d1fe8ebec1dd57bd675243c109a5f", 0x34}, {&(0x7f0000000480)="d58bf89b57e1a8c49b542f11c0516ed884946551a922dd314000806aa05f110cf1dbf99220d8d13e42863b89d2766cdf881ae683d2a43ef1f78ca5fc87b4469fcfd5591e0cb5288fa6ef7567885d276f32a8a3d69c71e0fef52b35f236ed52c429a71824", 0x64}, {&(0x7f0000000500)="ca64c3bd19d34d44e63c55d8a3266b2bf1831c9133425e891162fa146f0e9fe026ca6530f8dedc6347c14a925f56b0b58065732305af8ed07e2f1e49c537b3bea751bb1d852fe47b07306b9f0650e8ad86ab5362acf549759418b4e78cc07442c76499f42af67efed1a4a526e704f5010ff197ba9cf5f42e58b484426f1bea3d3f1fe7530455e3749898849eb9474594e928d9245df87f24d7a6e34c169063d2841bdc069958874a3fbfc9f848ae0a5937911281698d08e9a0731258f49ea3418073391f8b86bc4d8662401b37eaddef328f417af89f560fb811241713a761055b1e7b4ec8236aa69b7a780adbd7ffd4496e4db6705bc3a0b930", 0xfa}, {&(0x7f0000001640)="c766869edd00f3a18cae5c3ea4df8073613d719a421dc7dd770a9478b1d9709162e4f35c2cbc", 0x26}, {&(0x7f0000001680)="d2f8a37edcf1c730959518dcadab2fe603606063341bf1df4ae2f8c1e7e09e61143cce94189b515dd17f9b4251f0d8da14d149fabb56de2b5ef92f6ee2e094bb8d79db36e760f19b53285b6ecf6abbc65092c6bb0ceb867bbdc07b19", 0x5c}, {&(0x7f0000001700)="74a771bc889757262bf0cb97936bc2fdbf61c7d90b437c7295e3cc5f932789f3259d388c6db13ac7da0c8a947393593862d5b389b35a74825060558e1163fb01d59979f0b10551ec5413b9a0612c20bc2c8f6aa0543bab3e4556cf8ba2eb6d99bacc76f7a4fe42ed8f7dd62a982e15ad1033cf7c26721362bd7fc4709e9d5e76c1ca9b244d953a3849a497c79f5e6a93019dba4d1a9e72a14c337cb4207ea69a54e3ea1d93975d4336a0d5ebe8d2b9b0", 0xb0}], 0x7, &(0x7f0000001840)="78d8fafd7d59243b075115348d0e729309070bb862bf49d723f7d9178cb4d96676ad3d832f589ce45f006bc3261efb0d9ed25f7d4a56507d4b001622f3459edbd54a576e907c7af3c09fc74997299754104d6c4237313d25ee3c96533f4426a0dbd15c8fdaea981d52b1f0f1e23a69f844aa49cd5a426977b3f6d37e3c9a315141553efb3c1cd3ee2e68be50b761a6582ed941797851704726cb00f0f604f12e74f4756dd79252d988b531769fa1270325f2f4f284da40f864c6486519dfa41ddaf015d2506101", 0xc7, 0x800}, 0x20040010) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000040)="927d752fdc702ec0ca3acf7cfc8db8b571778ea6"}, 0x10) write$P9_RUNLINKAT(r2, &(0x7f0000000340)={0x7}, 0x7) 01:41:05 executing program 1: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) geteuid() geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@initdev, @in=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) setresuid(r2, r1, r0) r3 = geteuid() setfsuid(r3) 01:41:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1771.200896][T26262] cgroup: fork rejected by pids controller in /syz3 01:41:06 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:06 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x20200) io_uring_enter(r0, 0x3, 0x4, 0x1, &(0x7f0000000040)={0xfff}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in=@initdev}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f00000001c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) setresuid(r2, 0xfffe, r1) socket$xdp(0x2c, 0x3, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r3 = geteuid() setfsuid(r3) 01:41:06 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)={{0x3, 0x3, 0x2, 0x3, 0x5}, 0xa29, 0x3, 0x10001}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:06 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020400000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xa000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:06 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = geteuid() getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@empty, @empty}, &(0x7f0000000080)=0xc) readahead(r0, 0x1000, 0x4) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) setfsuid(r1) 01:41:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xe000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:06 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000140)={0x0, {0x100, 0xff, 0x1ff, 0x7, 0x100, 0x41}}) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) socket$pppoe(0x18, 0x1, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="80ec3f83b4d2fd51a39288bdc271f72e0000000cf59c"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:06 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x101400) fsetxattr$security_capability(r1, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x3, 0x371}, {0x7fffffff, 0x4}], r0}, 0x18, 0x1) 01:41:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:06 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000000)="9bd070000100ffffffee31") ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="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") 01:41:06 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1772.676324][ T26] audit: type=1800 audit(1556761267.621:152): pid=26558 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16728 res=0 [ 1774.654590][ T7] device bridge_slave_1 left promiscuous mode [ 1774.660789][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1774.746062][ T7] device bridge_slave_0 left promiscuous mode [ 1774.752280][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.336801][ T7] device hsr_slave_1 left promiscuous mode [ 1776.406971][ T7] device hsr_slave_0 left promiscuous mode [ 1776.459475][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1776.471134][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1776.482656][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1776.529171][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1776.603610][ T7] bond0 (unregistering): Released all slaves [ 1776.751033][T26600] IPVS: ftp: loaded support on port[0] = 21 [ 1776.815673][T26600] chnl_net:caif_netlink_parms(): no params data found [ 1776.849084][T26600] bridge0: port 1(bridge_slave_0) entered blocking state [ 1776.860959][T26600] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.869776][T26600] device bridge_slave_0 entered promiscuous mode [ 1776.882060][T26600] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.889691][T26600] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.897411][T26600] device bridge_slave_1 entered promiscuous mode [ 1776.914347][T26600] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1776.926125][T26600] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1776.946915][T26600] team0: Port device team_slave_0 added [ 1776.954274][T26600] team0: Port device team_slave_1 added [ 1777.086265][T26600] device hsr_slave_0 entered promiscuous mode [ 1777.124011][T26600] device hsr_slave_1 entered promiscuous mode [ 1777.242467][T26600] bridge0: port 2(bridge_slave_1) entered blocking state [ 1777.249651][T26600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1777.257118][T26600] bridge0: port 1(bridge_slave_0) entered blocking state [ 1777.264379][T26600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1777.331986][T26600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1777.354193][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1777.369500][ T3037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1777.379247][ T3037] bridge0: port 2(bridge_slave_1) entered disabled state [ 1777.400836][T26600] 8021q: adding VLAN 0 to HW filter on device team0 [ 1777.419853][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1777.435965][ T3037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1777.443071][ T3037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1777.470055][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1777.483020][T14087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1777.490210][T14087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1777.520159][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1777.531773][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1777.559228][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1777.572400][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1777.587532][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1777.600658][T26600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1777.650076][T26600] 8021q: adding VLAN 0 to HW filter on device batadv0 01:41:13 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:13 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x1f, 0x1, 0x0, 0x2, 0x6}, &(0x7f0000000040)=0x20) setfsuid(r0) 01:41:13 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KDSETLED(r0, 0x4b32, 0x7f0000000000) syz_execute_func(&(0x7f0000000180)="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") 01:41:13 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3f000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:13 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x17}, 0x56) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r0, 0x0, r1, 0x0, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="52d26b02000300"], 0x1) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) 01:41:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x60000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:13 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) setresuid(0xffffffffffffffff, 0xfffe, r0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r1, 0x400454cc, r0) r2 = geteuid() r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0xc0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000280)={0x1, 0x101, 0x280000000000000, 0x5, 0x1}) r4 = getgid() syz_kvm_setup_cpu$x86(r3, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000380)=[@text32={0x20, &(0x7f0000000300)="0f32b9800000c00f3235004000000f30b87d2800000f23d00f21f835200000070f23f882c7000f01c8c4e27d3120c4e2fd34eeb9e6080000b800780000ba000000000f3066b8a1008ed80f20c035040000000f22c0", 0x55}], 0x1, 0x0, &(0x7f00000003c0)=[@efer={0x2, 0x1000}, @cr0={0x0, 0x20000008}], 0x2) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f00000002c0)) write$FUSE_ENTRY(r3, &(0x7f0000000180)={0x90, 0x0, 0x1, {0x0, 0x1, 0x100000000, 0x4, 0x0, 0x9, {0x3, 0x3, 0xe0, 0xd1, 0x8dd, 0xc2, 0x6, 0x9, 0x7, 0x1, 0x5, r2, r4, 0x0, 0x80}}}, 0x90) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x4, 0x8100) setfsuid(r2) 01:41:14 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:14 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0xf7fffffffffffffd) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x9effffff, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:14 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) r3 = syz_open_dev$sndmidi(&(0x7f0000000300)='/dev/snd/midiC#D#\x00', 0x3, 0x10002) sendmsg$nl_generic(r0, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d8, 0x3b, 0x800, 0x70bd2b, 0x25dfdbfd, {0x1a}, [@nested={0x26c, 0x46, [@generic="b24bb2700eb2725386cb1b04ad06f9a4b334f810a93d26c6b77d67a2953262cb26cdcb864c65ba8741871ae1d7ed083a77c92563272fd72b6c56b9eed3001eb3f5ceaabe71f8997e94e01f2443e7e1eb37ba664b93b7fd25493451e71e5f17dda6db2bf0da18fe740e96b52c9e3ab068cca65f1e0c166bdf66e81bf766fb3a7fdd31866f8c19b843e17e0dc40119126f78caae2b9685f91a6aee926abe7fdc50e4d0d8504ab00f81c07d663d5952025d6d41989af27187beaf70bd45d869b37c77029d1944", @typed={0x8, 0x3d, @uid=r1}, @generic="5020c0bdf48336c7f1139f4d6163fa7f090b0d8da34ba97d2a13323e20b7642cebbb5456cb30d5499ff9e127148b55dd0de1b2c7ce431603b56ff58b3ab693df1b3108a5491b7bc4b48d1f6f80312423bdf0ba190a419b329d92a2484834495e79425624de88f69b26f4202cdfa7b85a05a113c52569fdd726bc", @generic="92ac89c3c4e64834e959f7b9239908934246ee2977986ad1381f75739bdc413c3c662aebc49792ff38baaacced506cf1611789cbbf01c2be8348cb962d00198e6fa17a56d3d83264e0396e3cfbc0f8a4e523c70d", @generic="f37a960b49cf670e85e5e15fdbe75755483567052e90c39c112bfa0509fe65be6932d07b7d01ffdb53ec39373f82a74765a695143c45e5ac35d24a2963daaaf27fd21f4660df776af53b98c1753c991377bf754456e33673418c89d03d63c0f9a4c1b42702cc54b4a93ef9af12bacc1fc2f21703738c23f026464c5179945d8f36d6becb58ba0277e93166396b3c0cad63c61acafd2272d33b3cc637845cbce098a16f4c27eca76bdf50b56acd5828dee12a1603d0cb6f4dd8643be9b08a7b63b0d77f8b59854a66d3198faca9"]}, @nested={0x14, 0x1c, [@typed={0x8, 0x29, @u32=0xecf}, @typed={0x8, 0x7e, @uid=r2}]}, @nested={0x18, 0xd, [@typed={0xc, 0x14, @u64=0x688}, @typed={0x8, 0x4a, @u32=0x1800000000000000}]}, @nested={0xc, 0x17, [@typed={0x8, 0x30, @ipv4=@broadcast}]}, @generic="f08c2ab584861dfa38e49a2859bc2c7148be4db902", @nested={0x10, 0x4b, [@typed={0x8, 0x19, @ipv4=@remote}, @typed={0x4, 0x39}]}, @typed={0x8, 0x4, @fd=r3}, @generic="f70863dae3b1704579c9b0f80d4444dd2f60938ba068b1f3d9b287106deb0e460813bbf7342dc34c7f1ff722f82dcb73c656aa036b44561ab82fc57e2b9b331979f4ca98f73d4d9c63cac26020e5ae9e20f65bdbb0ffddd8583b0f76428833aeeaacc3c6ce0ad8b0360f7a4bdfbaeeebc562ba4d2b64c71d5ec452f6dd43b8bc1e2234df6a84e9b35eec7d54a2958c6b99f3d84ad3ceddbb634d4d782aeb6950901a5f563a0a83d3bf0f9f6715f9ca178f05083a2bf9da92088c5176133da110b185ce9ba84d2a99beb28da2f0c87541b0ccd29ee3ef09f2a089343f37c3c6", @typed={0x14, 0x61, @ipv6=@mcast1}]}, 0x3d8}, 0x1, 0x0, 0x0, 0x8014}, 0xc0) r4 = geteuid() setfsuid(r4) [ 1781.714613][T11867] device bridge_slave_1 left promiscuous mode [ 1781.720843][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1781.774834][T11867] device bridge_slave_0 left promiscuous mode [ 1781.781083][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1783.476773][T11867] device hsr_slave_1 left promiscuous mode [ 1783.517062][T11867] device hsr_slave_0 left promiscuous mode [ 1783.569346][T11867] team0 (unregistering): Port device team_slave_1 removed [ 1783.581497][T11867] team0 (unregistering): Port device team_slave_0 removed [ 1783.593144][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1783.657718][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1783.739922][T11867] bond0 (unregistering): Released all slaves [ 1783.861855][T27011] IPVS: ftp: loaded support on port[0] = 21 [ 1783.926015][T27011] chnl_net:caif_netlink_parms(): no params data found [ 1783.960037][T27011] bridge0: port 1(bridge_slave_0) entered blocking state [ 1783.968385][T27011] bridge0: port 1(bridge_slave_0) entered disabled state [ 1783.979608][T27011] device bridge_slave_0 entered promiscuous mode [ 1783.987665][T27011] bridge0: port 2(bridge_slave_1) entered blocking state [ 1783.994871][T27011] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.002835][T27011] device bridge_slave_1 entered promiscuous mode [ 1784.021129][T27011] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1784.031886][T27011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1784.055945][T27011] team0: Port device team_slave_0 added [ 1784.063176][T27011] team0: Port device team_slave_1 added [ 1784.136421][T27011] device hsr_slave_0 entered promiscuous mode [ 1784.174014][T27011] device hsr_slave_1 entered promiscuous mode [ 1784.298379][T27011] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.305534][T27011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1784.312853][T27011] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.321790][T27011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1784.381943][T27011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1784.406539][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1784.421080][T14083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1784.429623][T14083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.450709][T27011] 8021q: adding VLAN 0 to HW filter on device team0 [ 1784.465329][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1784.475071][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.482250][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1784.506132][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1784.520792][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.527966][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1784.543186][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1784.562494][T27011] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1784.579767][T27011] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1784.593947][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1784.602119][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1784.617583][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1784.627246][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1784.646354][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1784.663109][T27011] 8021q: adding VLAN 0 to HW filter on device batadv0 01:41:19 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:19 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000080)=""/28, 0x1c, 0x377, 0xffffffffffffffd0, 0x8, 0xf2, 0x1}, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xc00e0000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:19 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:19 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) 01:41:19 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x4001fffc, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x10}, 0x10) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000240)={r3, 0x100}) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="e9e426e9bba30b23da9ec914"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:19 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x28000, 0x0) recvfrom$llc(r0, &(0x7f0000000040)=""/180, 0xb4, 0x10002, &(0x7f0000000100)={0x1a, 0x33d, 0x8001, 0xffffffffffffffc0, 0x1f, 0x7, @broadcast}, 0x10) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = geteuid() setfsuid(r1) 01:41:19 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0ffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:19 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:19 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 01:41:20 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:20 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0x6, 0x4) setfsuid(r0) 01:41:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf6230000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:20 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7, 0x5, 0x6}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000004c0)={r2, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000580)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x69) syz_execute_func(&(0x7f0000000180)="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") ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x401) 01:41:20 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:20 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:20 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000040)={0x3c, "62e28bb95b123b1f8914145199c2752975689d3e0685f54e6f162d9a6c7e703065af13397d3f5978ae69d0f4ec51993a85e4b4e933af310f29492ecc27a1f1832e44a64c7c4a85e33d857156b015109d75acc3bbb14da8635be414ac45da36adbac08528ddbe39768fdabac440e0fa75db9a0374ddb093ed1c1e1e26bfb9e64f"}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 01:41:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:20 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="e76604d15e0068"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:20 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_DIRENT(r0, &(0x7f00000002c0)={0x140, 0x0, 0x3, [{0x1, 0x8001, 0x1, 0x7ff, '^'}, {0x0, 0x7, 0x6, 0x6, '[wlan0'}, {0x1, 0x8, 0x12, 0x4, '/dev/snd/pcmC#D#p\x00'}, {0x5, 0x7, 0x12, 0x9, '/dev/snd/pcmC#D#p\x00'}, {0x4, 0x400, 0xb, 0x1, '/bdevcgroup'}, {0x1, 0x0, 0x0, 0x8000}, {0x2, 0x3f, 0x5, 0x1000, '@user'}, {0x3, 0x6, 0x12, 0x92, '/dev/snd/pcmC#D#p\x00'}]}, 0x140) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000080)={0x454, 0x5, 0x5, 0x3ff, 0xe9}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:20 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x200030, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e733d756e69782c61cf7174f00c3e63636573733d616e792c6f626a5f757365723d75736572776c616e312c6673757569643d72777577777900002d313777662d6230377f2d367700352d6675657b007f67642c6673757569643d3630373f000077362d7f673f622d7d007f002d367600362d64320030756131772c7065726d69745f646972656374696f2c7375626a5f747970653d2c736d61636b66737472616e736d7574653d2176626f786e657431707070306e6f646576757365727d76626f786e6574315b247b2b2c00"]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x149000, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) 01:41:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:20 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:21 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = geteuid() setfsuid(r1) 01:41:21 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x20000000003, 0x3e5080) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000340)) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000300), &(0x7f00000002c0)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x633, 0x81, 0x1f, 0x7da50f8b, 0x7ff}, &(0x7f0000000440)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000480)={0x7, 0x5, 0x4, 0x79b, 0x4, 0x1, 0x1f, 0x9, r2}, &(0x7f00000004c0)=0x20) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x15, 0x4) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r3, 0x4, 0x1}, 0xc) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x40000) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) 01:41:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff9e, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1786.966026][ T26] audit: type=1800 audit(1556761281.911:153): pid=27551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16741 res=0 01:41:22 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:22 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:22 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x60) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x0, 0x8000000000000000, {0x56, 0x1, 0x6, {0x2}, {0x5, 0x6}, @const={0x1f, {0x0, 0x6, 0x3, 0x2}}}, {0x57, 0x0, 0x2, {0x100000001, 0xfffffffffffffffa}, {0x4, 0x1}, @cond=[{0x0, 0xa4, 0xff, 0x401, 0x8, 0x1}, {0x8, 0x3, 0x3f, 0x9, 0x7fffffff, 0x1104}]}}) r1 = geteuid() setfsuid(r1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) 01:41:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffffff0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:22 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:22 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:22 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000340)={r2, 0x9, &(0x7f0000000100)=[0x3, 0x7fc48035, 0x100000001, 0xffff, 0x10000, 0x1f, 0xff, 0x4, 0xa43], &(0x7f0000000140)=[0x401, 0x10001], 0x0, 0x1, 0xfff, &(0x7f00000002c0)=[0xcf5], &(0x7f0000000300)=[0x8, 0x3, 0x9, 0x19b, 0x81, 0x4f26, 0x9, 0xf3]}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000080)={0x7, 'syz1\x00'}) 01:41:22 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x40) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f00000000c0)=""/140) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000180)=""/187, &(0x7f0000000240)=0xbb) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000040)=0x4, 0x4) 01:41:22 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020223000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:22 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x80000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0x10000, @local, 0x5}, @in6={0xa, 0x4e22, 0x4, @remote, 0x9}, @in6={0xa, 0x4e24, 0x80000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x5}, @in6={0xa, 0x4e21, 0x0, @remote, 0x81}], 0x70) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/96) r1 = geteuid() setfsuid(r1) 01:41:22 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x2002) syz_execute_func(&(0x7f0000000180)="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") 01:41:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x40030000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1788.013393][T27925] Unknown ioctl 19462 [ 1788.034074][T27925] Unknown ioctl -2130675966 [ 1790.934510][ T7] device bridge_slave_1 left promiscuous mode [ 1790.940736][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1791.014898][ T7] device bridge_slave_0 left promiscuous mode [ 1791.021156][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.736859][ T7] device hsr_slave_1 left promiscuous mode [ 1792.807058][ T7] device hsr_slave_0 left promiscuous mode [ 1792.859292][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1792.870887][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1792.882342][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1792.947768][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1793.031596][ T7] bond0 (unregistering): Released all slaves [ 1793.130357][T28055] IPVS: ftp: loaded support on port[0] = 21 [ 1793.204824][T28055] chnl_net:caif_netlink_parms(): no params data found [ 1793.239065][T28055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1793.246314][T28055] bridge0: port 1(bridge_slave_0) entered disabled state [ 1793.254634][T28055] device bridge_slave_0 entered promiscuous mode [ 1793.263468][T28055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1793.270765][T28055] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.278557][T28055] device bridge_slave_1 entered promiscuous mode [ 1793.298649][T28055] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1793.310407][T28055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1793.330292][T28055] team0: Port device team_slave_0 added [ 1793.339606][T28055] team0: Port device team_slave_1 added [ 1793.396427][T28055] device hsr_slave_0 entered promiscuous mode [ 1793.434105][T28055] device hsr_slave_1 entered promiscuous mode [ 1793.519890][T28055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1793.527082][T28055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1793.534506][T28055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1793.541597][T28055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1793.590707][T28055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1793.605747][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1793.616529][T11073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1793.625399][T11073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.641033][T28055] 8021q: adding VLAN 0 to HW filter on device team0 [ 1793.654505][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1793.663027][T11073] bridge0: port 1(bridge_slave_0) entered blocking state [ 1793.670176][T11073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1793.697048][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1793.706712][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1793.713940][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1793.722852][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1793.732817][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1793.749634][T28055] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1793.760536][T28055] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1793.773162][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1793.781797][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1793.793107][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1793.813367][T28055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1793.822072][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:41:30 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf11000000c4a37bf0c51d41e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:30 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:30 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x800000000, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200400, 0x0) ioctl(r0, 0x800003ff, &(0x7f0000000780)="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") syz_execute_func(&(0x7f0000000180)="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") 01:41:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:30 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = semget$private(0x0, 0x4, 0x616) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000180)={{0x7ff, r0, r2, r0, r3, 0x16, 0x20000}, 0x8, 0x6, 0x2}) 01:41:30 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ubi_ctrl\x00', 0x2000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000028050000f801000080030000f8010000b8020000f8010000900400009004000090040000900400009004000006000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000018c79b6381a9ac0c2b7fe695ac2afdf64de4ebbd5d1723b75a4da192bf7328615b3982f43d19483f171c0be2a1b5645d574324e22d2840d02d465f594"], @ANYBLOB="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"], 0x588) r1 = open(&(0x7f0000000dc0)='./bus\x00', 0x100, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000680)={r1, &(0x7f0000000c80)="cd3756e3b60ec2eebb8bf4ab0bc5d2e84209d1dc26733cd019e5fbf19437d558243eca4f6d5e843c29b2bdd50d9fbc768c2cd89fc80000c8081952ce85561eda46e51b6e1f3a0b760eea06f70f000453f94374d924f14cda596324f062b3c5ff0bd2b2cb4f4c27739da96cae920bc88b"}, 0x10) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x17}, 0x56) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000300)={0xb, 0x8, 0x401}) r3 = open(&(0x7f0000000500)='./file0\x00', 0x2, 0xfffffffffffffffc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @local}}, 0x113b, 0x4, 0x200, 0x0, 0x4}, &(0x7f0000000140)=0x98) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$SIOCX25SCALLUSERDATA(r5, 0x89e5, &(0x7f0000000d00)={0x4c, "d0bed506321ac16069dc89dd4bcbd4be36236affed8dd66083e6eb4cb2231494765dee415e62b6014b2d4693cc5040469dffa2d9fdd0f11e1ea490c79c4d19d24086b264f60acc6abd6c094e19703818e64514bdb352ce9fc912a90d1b0df3cdf0381681b88eb6a6796153c819f4dc4531ccc5c09fc3825415829eb7fdd420a6"}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000380)={r4, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x9, 0x129, 0x7f, 0x7c7e, 0x3f}, &(0x7f0000000180)=0x98) inotify_add_watch(r1, &(0x7f0000000640)='./bus\x00', 0x2000a00) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000440)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="1410d030bf21ff4148afa5135b68059c143e182380568300000000050000000000000087bd01c852dab34ca62d60e86b532a1de195112d077fa2f1ecdd2b"], 0x1) write$P9_RUNLINKAT(r3, &(0x7f0000000340)={0x7, 0x4d, 0x400000}, 0x7) 01:41:30 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r1 = geteuid() setresuid(r1, r0, 0xffffffffffffffff) r2 = geteuid() setfsuid(r2) 01:41:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x100000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:31 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e20, 0x9, @remote, 0x4}}}, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) setfsuid(r0) 01:41:31 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x17}, 0x56) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f0000000140)) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) read(r1, &(0x7f0000000380)=""/223, 0xdf) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000640)={"d9df614954a2b97a7e3c1a36b4e2376b182347301b2000530a94d2e08949d03369e294c0d205b8c67e574f90bb1537c15c693818034fa001aa298d4134882ba80bf9765f7fe69553f8b21cba0f00e0738b62e1904a2c26ca4ac4ba29d336ef39af860aaa14afafb7f07a0ae843b7fd4c12f1dd021449e1aa2f98af3764e205261e8f924af92ca83882630350047a4c5140ea2caabae88ce3be8e9e7a35959e75dca6b21aa38f0f9fc640ec024f37441be335348f998bd859efbe82f30dc542459a00abc203043a284b555593ab1460cb8d88789e2ddd17c56102954b90f6772c90a57d001e9a4a0e05595a8a38fdabc017260921701d602292a863e1b3f040e71f5dc4abdd4220f9e8246d1943bfa021105e5a004a1c8f8f18f0f671b1a9a02286d969eb0adcb60e3591d67bf663df41be5be083c7d2f6fe4faa2fee5868d100c976bc079e5a6d7a478f45fb606e93a2b6f6ff6e6e80ebe94c3b26f5de014dbbcdef87d1f2fdf226d61c768678205d724d90249357464f3a1d4c688c8db6ad5981c074926b96fbc15840f558ca979eb6a316ec2cc6b965f18b41d3e5dbc97d6b5b65e98e1a919b859e83993b2b0553747b0ec1737a0d6c987d110bc1c1855bae1bd0c30af01d72c4a5a1e1968783223087f96361c34f3181bb18a595d9481302a48a5869bc4b81a78cfd4fae1ed17c2a9187af496bdb06545c1eca93a31f43c07ecb78d7c039300930aeb656afa3295668d7ec7b5257a374c10218495e748c66e1b021dd55609e2d4615c416176cfecffbacddd83ee65bfbb6279a905622f714d91f0dd2c9931ec9ecfe0ffe5cbb792cf0105e6af4c790273db59806ac9bb26d81173f541027fa69256772dad8166d65df1420a2f2f351fcbaa8fdffcf4854c754e250f799100dce916cdd23a2c57809c2bad978e20c97a5ebe68129e0f53fa9af1a756b135c0c5da3a8fbe3e6bb3c09ce3df534ba415ce54a58ac6c721a3f03fa85b9d62329c55c1388fa4e78bed26da0f8d2d754d2c8a25c54d946798daa41bf19435c8e6c87b4e4bf68aa10259954edd1341252492f40362b788443bc4659d143a153d97a7bcd94492119cae73b26f5b25b116398931fc8b2a1c31bf1e9c356149af07f8d7feec91696c35ebf3f19ee594e4fba6c25ff30dc61550d8f988e7478adfb7288f4605411b1d38e01e30f3ae2407df029b6b1724fe0c3ee9ca3988ab5bc3bac15c1794babcedbc64dbcc3cbdb188a70a0b713591bd823847838f43f48002a7fa802878e9123f362ae8a1223346518c9900f5c78c15a368b73c6427f7ec177d25086df3430e2e2987497f69faf88e4ebfe455998c99ddae5347709f8560fe832ac683302c0de258cd08c8c931f19111c7363e3a97b1588052518532e158b3e6e4f9420e252ada3de17434d57ab460a15f35d13f6b8a543748d91f5"}) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r1, &(0x7f0000000340)={0x7}, 0x7) 01:41:31 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000000c0)=""/144) syz_execute_func(&(0x7f0000000180)="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") 01:41:31 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1796.780129][ T26] audit: type=1800 audit(1556761291.721:154): pid=28539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16791 res=0 [ 1798.964574][T11867] device bridge_slave_1 left promiscuous mode [ 1798.970770][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1799.024848][T11867] device bridge_slave_0 left promiscuous mode [ 1799.031076][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1800.706735][T11867] device hsr_slave_1 left promiscuous mode [ 1800.749250][T11867] device hsr_slave_0 left promiscuous mode [ 1800.808682][T11867] team0 (unregistering): Port device team_slave_1 removed [ 1800.820310][T11867] team0 (unregistering): Port device team_slave_0 removed [ 1800.832378][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1800.870273][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1800.961426][T11867] bond0 (unregistering): Released all slaves [ 1801.090329][T28609] IPVS: ftp: loaded support on port[0] = 21 [ 1801.152267][T28609] chnl_net:caif_netlink_parms(): no params data found [ 1801.185185][T28609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.192346][T28609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1801.200244][T28609] device bridge_slave_0 entered promiscuous mode [ 1801.208745][T28609] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.216033][T28609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1801.223882][T28609] device bridge_slave_1 entered promiscuous mode [ 1801.244769][T28609] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1801.255152][T28609] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1801.275039][T28609] team0: Port device team_slave_0 added [ 1801.283787][T28609] team0: Port device team_slave_1 added [ 1801.326290][T28609] device hsr_slave_0 entered promiscuous mode [ 1801.364123][T28609] device hsr_slave_1 entered promiscuous mode [ 1801.472415][T28609] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.479550][T28609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1801.487033][T28609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.494183][T28609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1801.535033][T28609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1801.549946][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1801.559187][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1801.568673][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1801.582766][T28609] 8021q: adding VLAN 0 to HW filter on device team0 [ 1801.600813][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1801.630243][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.637704][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1801.666034][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1801.675704][T11073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.682804][T11073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1801.691779][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1801.720311][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1801.731738][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1801.747738][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1801.768248][T28609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1801.783186][T28609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1801.798916][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1801.831667][T28609] 8021q: adding VLAN 0 to HW filter on device batadv0 01:41:38 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x200000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:38 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x100, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x4100) r4 = syz_open_dev$radio(&(0x7f00000005c0)='/dev/radio#\x00', 0x3, 0x2) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x80, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001900)='/dev/rtc0\x00', 0x20100, 0x0) r8 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000001940)='/dev/video2\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000001980)={0x8, 0x20, 0x1, 0xffffffffffffff9c}) r10 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x800, 0x0) r11 = openat$audio(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/audio\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a80)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001a40)='\x00', 0xffffffffffffffff}, 0x30) r13 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/sequencer\x00', 0x101000, 0x0) r14 = socket$inet_dccp(0x2, 0x6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000001fc0)='\x00'}, 0x30) r16 = getgid() r17 = syz_open_dev$rtc(&(0x7f0000002040)='/dev/rtc#\x00', 0x9, 0x800) r18 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000002080)='/dev/video2\x00', 0x2, 0x0) r19 = socket$key(0xf, 0x3, 0x2) r20 = socket$vsock_dgram(0x28, 0x2, 0x0) r21 = getpid() stat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = syz_open_dev$usb(&(0x7f0000002180)='/dev/bus/usb/00#/00#\x00', 0x9, 0x200080) r24 = syz_open_dev$media(&(0x7f00000021c0)='/dev/media#\x00', 0x5, 0x0) r25 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002200)='/proc/capi/capi20\x00', 0x202, 0x0) r26 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000002240)='/dev/video1\x00', 0x2, 0x0) r27 = syz_init_net_socket$ax25(0x3, 0x3, 0xf7) r28 = socket$inet_sctp(0x2, 0x1, 0x84) r29 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000002280), &(0x7f00000022c0)=0xe, 0x80000) r30 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002300)='/dev/dlm_plock\x00', 0x101002, 0x0) r31 = syz_open_dev$video(&(0x7f0000002340)='/dev/video#\x00', 0x3, 0x0) r32 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000002380), &(0x7f00000023c0)=0xe, 0x80800) r33 = syz_open_dev$sndpcmc(&(0x7f0000002400)='/dev/snd/pcmC#D#c\x00', 0x7, 0x100) r34 = socket$can_bcm(0x1d, 0x2, 0x2) r35 = userfaultfd(0x0) r36 = accept4$llc(0xffffffffffffff9c, &(0x7f0000002440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002480)=0x10, 0x80800) r37 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/dlm-control\x00', 0x140, 0x0) r38 = signalfd4(0xffffffffffffffff, &(0x7f0000002500)={0xff3}, 0x8, 0x80000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000002540)={0x0, 0x80000, 0xffffffffffffffff}) r40 = socket$packet(0x11, 0x3, 0x300) r41 = openat$ion(0xffffffffffffff9c, &(0x7f0000002580)='/dev/ion\x00', 0x4000, 0x0) r42 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000025c0)='/selinux/load\x00', 0x2, 0x0) r43 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002bc0)=0x0) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000002f00)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000004c0)=[{&(0x7f00000000c0)="c36bd01be41a942732a505a770e945c75fe1214f4e25c43cfa24a22cd29766d12375afb6ad7ee5f41e5e34905a2c71eab5a12dbe5d44d69f0426cd8c815b2b12bf53e535c46a462cb57fc29bc2ad0a10ba4fc16a994e01bcb05a34d35f23f32963560bc1cd4a2841cd324e8bf5d40fac78cabf364e53906e808b2e754c35eef2a771455a11a03c5b49654641f9bb824ad8768b2f297985ebc96cd8ba9ee589b5cb183db303299172101ac9a76a5be0a4c148479bd324cb03b59cc2607f42bdb9b243b329711a91d4ff4b6ffcbd9cbbfedc953eac6b3b4c5254881f678323a24844f14aafd29122dbe328525c37357e12124f82", 0xf3}, {&(0x7f00000001c0)="609830bac38269b15b2252f302bccd004f080b99d1d08a0a1c1af865b4e975b7f051670513d30197d9d3c5e4fa64740ac9c12f8775cf17f646e6eda164a3de3698b2050c8ccbf2f242e80caaa842e9d94ec09601e8f96f", 0x57}, {&(0x7f0000000240)="b315f565137ac11f54e1ff1c7387d06944aa99001cc1b862aa6a7a602d183804f5461ae956b9ea21196aaf046b35ec70a8b734a9d03ed6ca7eb8dcd56252617014045e4679d4870697c27ebea082b0db02f24afee0c8758e6c513ac419dc98e8d966a342a9289d1b6e07f69444a71a77f689f20c0f6fd3dba695916099c71aa9e5c9473e60242d850a71ed798b5c30e9e5cc94", 0x93}, {&(0x7f0000000300)="226cfb4fde834c8738a307efd98dadae1084a395", 0x14}, {&(0x7f0000000340)="07c5d52ed58f0773454d3d02b594c10c51c9942da5da6bc92780f5334f18dc0c4f6124c1061d2c20104a133ebdfeedbbdce5abb1025af87ca8010be68581ab23909ad450bc52995ba80a8e58037e2fe39d7ba602657c9e1a7e167de7ae3646d7c18aa0fe8431d980a7a2f3c45a897006b84f2f4b65fae826e0feb3864d964df893e95b79a4fdc7673bae087f4dfb0931dc1fa111d57592eda7dedaf14c445e31", 0xa0}, {&(0x7f0000000400)="c3fa3923b0c0003d865a5d416caa926a2ac45ce44de28526e9a02599e80c06fb", 0x20}, {&(0x7f0000000440)="708cd1696b4dbd92ec6953549341b6c0415f9fdd5466d40bdd9587bac11a2a2459de9c8077eb51", 0x27}, {&(0x7f0000000480)="0da6085f70fbbe27baffebd8d3097d68d63d04bc44a2ddb63e21209f6d3cd43181ab861d7671632c3f4803dac5161303ca0b7bd7e0", 0x35}], 0x8, &(0x7f0000001b00)=[@rights={0x28, 0x1, 0x1, [r2, r3, r4, r5, r6]}, @rights={0x20, 0x1, 0x1, [r7, r8, r9, r10]}, @rights={0x18, 0x1, 0x1, [r11, r12]}, @rights={0x18, 0x1, 0x1, [r13, r14]}], 0x78, 0x48d0}, {&(0x7f0000001b80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001c00)="2d65a317396a105269e5e9a9fbaa6fdc879c486b3d1297225a00bf176a5f864b05535990279501817c4cf8a210108280d3001aee986c25afdb1e73f0451f1f2e6fb3e006f12e1dd731a8b1330a4eade89c8ad85eed7ae0710849012c1976895fdb9a23277a9d0f82bfa677d182b4db175f3ef943efdddd9238a9d3ec73746feb721f60ba722e958b10b1189c8923e08eb6db8437c6f7c5e966ed8b3e176e", 0x9e}], 0x1, 0x0, 0x0, 0x1}, {&(0x7f0000001d00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001d80)="77a384098d47b7923bfd8a771ac891c85733dd82ba4f2213201d747fae209d6792e0f43f65a4afa7f67c8a186c5f3c0faceb59a3b8ca7d26b1fae69b7c8aa03f2236b9d78073d1d106f3da40f6d5d2", 0x4f}, {&(0x7f0000001e00)="385e115ba950a2dbfb9516bbc9ff9c215e2ea3297197ab7cfdfb4f146d578fbdbe0dc2310c63ac802f60fcfffc91cf121d6fbfa64db9816bd5d1e03958d051e220b05480c3a349ba3795e08e1a", 0x4d}, {&(0x7f0000001e80)="caf02acb58a41552e4d8b111a4050cd4a29c76b131f7f84948454dbd71bb54409dfcbac295b77241036b2c9548f3170757a841d30806f1e15d4425abcd41c0f5456e9ea15ebe030e545fefd29c3cab48fb197a2095eb78d6478b17283bc99bc8e69bd92ec1957388e2e089379e3869685fc543d7643d7a1b3d4a45b5ccb212f69d64a4d008a1d471115002b4d30a0d2451ec485f7cdd32fe5c172c80a5077e9edafbd1f3c69ad4f53860737968e81b2135a88b957febbe0367a06d428eeb1f73899fd2ed35ef0497e91dad4c74294b39933d83c2b0e86874b911d364d832d034c2033d52950eb65ea0405c3e59cb0ff98a10f394a30fb7a2c099ce2bafb8", 0xfe}], 0x3, &(0x7f0000002600)=[@cred={0x20, 0x1, 0x2, r15, r0, r16}, @rights={0x20, 0x1, 0x1, [r17, r18, r19, r20]}, @cred={0x20, 0x1, 0x2, r21, r0, r22}, @rights={0x20, 0x1, 0x1, [r23, r24, r25, r26]}, @rights={0x30, 0x1, 0x1, [r27, r28, r29, r30, r31, r32, r33]}, @rights={0x38, 0x1, 0x1, [r34, r35, r36, r37, r38, r39, r40, r41, r42, r43]}], 0xe8, 0x488c0}, {&(0x7f0000002700)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002b40)=[{&(0x7f0000002780)="ff0381a770e72c1239a6232df7eabc04faea32e3f3b49f7dd403ac814412fd88c783fc93de7af6b9f9cf190e24020f900d8aad34326c02451922f6bcf25c83c93e3148eb666d9b5480a2d62693c03835b11edcbc619a14f797d6c71ec9194c1055c12b5b2cc1585e109ca5c109b9a51617f323f825a96f95554d3b41fd6c9633e5999d37715b9f03b024ae6a3250f9fc8c0c2a8e3a02171ca6b6fd3129bc146056f1dc41a457c9476263569e054eecbb22d57f94a3df86b123cdcdea890f83602459e69435bce741e9537cc2a78f99e41f6fc9c51fa8bdb5c68e03991cc68666dbdce94fa8273827352a6505489015d34ce1c28eb1ecfc487279", 0xfa}, {&(0x7f0000002880)="23262420f24c98bdff0024ef452e9f17ad9895c573ed891807c16c40ef7222fe2b5686f16a1adb0a68436ff86a396387d70c1ed1ecccce6755e1912f56503957dd33ae553500103ef6c1ce1531562516a4686f438efaee436fa14f9650559b37ca7862714fa3f1ba7fb01495c4bbea49b6a525c4ee862b3150cfaea1d63591a85ffd94fb6589b6cda82d1d032f5f0e8c28735e13723ac7fb619ec7bd986e28ed9b4f05e2ab0920d229f71972b3", 0xad}, {&(0x7f0000002940)="6607c8676031553a868a33eec656e3c4765e604040ff5710729bfff82b69c707540c01dd2623b79eb8814eecece55f791530869b2409f8ef065f6f1b0e9a126108f32b098843bd5640a134091b1ee08c2b801a1e1e8264c2ce0113b8bbc2984db47c70112b1716eb5ad99cfdf153ef0e4d14a68d730789e50a613ef629dcd5025d7a2ac9dca63ab0fb357755c6e447cc9e0f0c4cefb3b117ecff4124eefb16a75e061ea15afb732e0b4ecd0d274df580059f6773c4356ad67081dbf5b97e4c86f3cf734da43396a55a", 0xc9}, {&(0x7f0000002a40)="424600fd463f6ca9c08264a62709c97ebae45a94b8f00a", 0x17}, {&(0x7f0000002a80)="bc23d0ee4640faeb526a10f2b1905b5da03596b51e6993bf02e826d00124be686abae6218fef3ad2fa2e16775d8a93bb5d1692e59acf9488609d698d7554633924017f07f14d346c66349d88f19b7a5d94133dbb31739a5717b07311bc92c5b343fb072205261940c4cf76684a1de6c9e715208703985fba242e78e7a3ef9eb22644488024e086a54ca7d115a1caf8bf4cd3d39cc3ef79b4fa7e", 0x9a}], 0x5, &(0x7f0000002cc0)=[@cred={0x20, 0x1, 0x2, r44, r0, r45}], 0x20, 0x4080}, {&(0x7f0000002d00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002ec0)=[{&(0x7f0000002d80)="ba0af7a93acd832711eef2b8732f2f3e123cc764a2199b64da604d4e7297dcc2ca68dc7d77dc7ac0de687f3dffe9c9f5ef50a5cdd70a651159758fe9ba88b93920cef43c37c76745401fb8d9b2e59f0378961f01f6d38035408a4aa110d6e64b6fbe2ff6cc61894251c7b022ea6bfab753", 0x71}, {&(0x7f0000002e00)="b1d43b3c4b10bfecaee6418771052530c09bfe88dbdd1a06cd2e9d0a", 0x1c}, {&(0x7f0000002e40)="f98fa8fc9b63d54159f5b10479cae1c345b20078f3679be6856df22095b9572e092bd73ecfaa4e3c046ea05376caee437e9a8dd927e4eef6c398df48794f4a4daca1b3", 0x43}], 0x3, 0x0, 0x0, 0x20000080}], 0x5, 0x40010) 01:41:38 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000080)={0x80000000, 0x2, 0x4, 0x6fe5, 0x4}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:38 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:38 executing program 2: mknod(&(0x7f0000000140)='./file1\x00', 0x9dc66221e8af4c32, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = getpid() getpgid(r0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x17}, 0x56) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='4'], 0x1) write$P9_RUNLINKAT(r1, &(0x7f0000000340)={0x7}, 0x7) 01:41:38 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="14c261da222800b72033e65f29a6906718f30b"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:38 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x81, 0x80001) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0x180f, 0x6, 0x6, 0x8001, 0x40}) 01:41:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x400000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:38 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r2, 0x3}, &(0x7f0000000140)=0x8) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_DESTROY(r0, 0x5502) syz_execute_func(&(0x7f0000000180)="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") 01:41:38 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e02ffe0000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xa00000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1804.473422][ T26] audit: type=1800 audit(1556761299.411:155): pid=28965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16658 res=0 [ 1806.544615][ T2993] device bridge_slave_1 left promiscuous mode [ 1806.550838][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1806.621019][ T2993] device bridge_slave_0 left promiscuous mode [ 1806.628156][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.267083][ T2993] device hsr_slave_1 left promiscuous mode [ 1808.329266][ T2993] device hsr_slave_0 left promiscuous mode [ 1808.389169][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1808.400938][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1808.412369][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1808.450713][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1808.550062][ T2993] bond0 (unregistering): Released all slaves [ 1808.680491][T29127] IPVS: ftp: loaded support on port[0] = 21 [ 1808.741393][T29127] chnl_net:caif_netlink_parms(): no params data found [ 1808.783037][T29127] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.796918][T29127] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.805869][T29127] device bridge_slave_0 entered promiscuous mode [ 1808.813913][T29127] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.821353][T29127] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.829515][T29127] device bridge_slave_1 entered promiscuous mode [ 1808.848163][T29127] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1808.858532][T29127] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1808.877376][T29127] team0: Port device team_slave_0 added [ 1808.955511][T29127] team0: Port device team_slave_1 added [ 1809.026414][T29127] device hsr_slave_0 entered promiscuous mode [ 1809.074066][T29127] device hsr_slave_1 entered promiscuous mode [ 1809.132215][T29127] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.139412][T29127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.146875][T29127] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.154460][T29127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.221769][T29127] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1809.243238][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1809.261003][T14083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1809.270671][T14083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1809.291494][T29127] 8021q: adding VLAN 0 to HW filter on device team0 [ 1809.305385][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1809.314814][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.322077][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.341121][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1809.349938][T11073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.357103][T11073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.385477][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1809.394645][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1809.403227][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1809.420503][T29127] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1809.432871][T29127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1809.445440][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1809.453449][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1809.475440][T29127] 8021q: adding VLAN 0 to HW filter on device batadv0 01:41:45 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x3}, 0x2c) r0 = syz_open_pts(0xffffffffffffff9c, 0x121201) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x80000001) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") uselib(&(0x7f0000000100)='./file0\x00') syz_execute_func(&(0x7f00000002c0)="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") ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) 01:41:45 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x82, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x0, 0x4, 0x101, 0x0, 0x13}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x43fffc) write$P9_RSYMLINK(r2, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x2, 0x0, 0x3}}, 0x14) 01:41:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xe00000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:45 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:45 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000380)={{0x3, @addr=0x19}, "3e11dba3b8ae29227a165ac3643230072eace85afc5b88bfb7f105a0b653dde9", 0x2}) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00'], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:45 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x800) r1 = geteuid() setfsuid(r1) 01:41:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf00000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:45 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:45 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) r1 = geteuid() setfsuid(r1) 01:41:45 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x82001, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x100) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000001640)={@null, @null, 0x1, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000001c0)={0x9c0000, 0x70, 0x4, [], &(0x7f0000000180)={0x990a93, 0x20, [], @p_u32=&(0x7f0000000140)=0x2}}) creat(&(0x7f0000000200)='./file0\x00', 0x11) accept$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000480)=0x1c) syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x100000001, 0x80000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000500)={0xffffffffffffff9c}) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f00000002c0)="abb140f5d03936ade9f3320ad9d3a2681c6d275a654c6209368a27c375e159ca506ebb7636c0a562e3fa56008b6423d6a7b4b820fd710852e240702c15c9dce47accd2f83e791c3b8ec13f2482c045749aa7fa37e196fd92a0", 0x59}, {&(0x7f0000000540)="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", 0x1000, 0xffffffffffffffc7}, {&(0x7f0000000340)="fe62df9ca43e9bc36444543b9a342f6af35841393978eace1ec2e2d3e7ac975713f184f3dcd4ed5ee3246798a1012d7d", 0x30, 0x6}], 0x205400, &(0x7f0000001540)={[{@max_inline={'max_inline', 0x3d, [0x33, 0x35, 0x77, 0x7f, 0x38, 0x6d, 0x65]}}, {@fragment_metadata='fragment=metadata'}, {@fragment_data='fragment=data'}, {@acl='acl'}, {@fragment_all='fragment=all'}, {@treelog='treelog'}, {@compress_algo={'compress', 0x3d, 'no'}}, {@nospace_cache='nospace_cache'}, {@device={'device', 0x3d, './file0'}}, {@fragment_all='fragment=all'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ubi_ctrl\x00'}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, '/dev/ubi_ctrl\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0xfff, 0x101400) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000052c0)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000053c0)=0xe8) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000016c0)) ioctl$SIOCAX25DELUID(r5, 0x89e2, &(0x7f0000005400)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r6}) r7 = geteuid() setfsuid(r7) 01:41:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3f00000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1812.854476][T14607] device bridge_slave_1 left promiscuous mode [ 1812.860668][T14607] bridge0: port 2(bridge_slave_1) entered disabled state [ 1812.904475][T14607] device bridge_slave_0 left promiscuous mode [ 1812.910662][T14607] bridge0: port 1(bridge_slave_0) entered disabled state [ 1814.565915][T14607] device hsr_slave_1 left promiscuous mode [ 1814.619190][T14607] device hsr_slave_0 left promiscuous mode [ 1814.677096][T14607] team0 (unregistering): Port device team_slave_1 removed [ 1814.690242][T14607] team0 (unregistering): Port device team_slave_0 removed [ 1814.701862][T14607] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1814.758401][T14607] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1814.851207][T14607] bond0 (unregistering): Released all slaves [ 1814.990217][T30327] IPVS: ftp: loaded support on port[0] = 21 [ 1815.052577][T30327] chnl_net:caif_netlink_parms(): no params data found [ 1815.092588][T30327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1815.099816][T30327] bridge0: port 1(bridge_slave_0) entered disabled state [ 1815.107758][T30327] device bridge_slave_0 entered promiscuous mode [ 1815.116086][T30327] bridge0: port 2(bridge_slave_1) entered blocking state [ 1815.123219][T30327] bridge0: port 2(bridge_slave_1) entered disabled state [ 1815.131127][T30327] device bridge_slave_1 entered promiscuous mode [ 1815.150969][T30327] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1815.162370][T30327] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1815.233676][T30327] team0: Port device team_slave_0 added [ 1815.241021][T30327] team0: Port device team_slave_1 added [ 1815.306389][T30327] device hsr_slave_0 entered promiscuous mode [ 1815.354055][T30327] device hsr_slave_1 entered promiscuous mode [ 1815.403136][T30327] bridge0: port 2(bridge_slave_1) entered blocking state [ 1815.410309][T30327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1815.417781][T30327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1815.424919][T30327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1815.473157][T30327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1815.488797][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1815.498865][T14089] bridge0: port 1(bridge_slave_0) entered disabled state [ 1815.507305][T14089] bridge0: port 2(bridge_slave_1) entered disabled state [ 1815.528534][T30327] 8021q: adding VLAN 0 to HW filter on device team0 [ 1815.546962][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1815.561722][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1815.568993][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1815.600688][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1815.609872][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1815.617048][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1815.653134][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1815.662639][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1815.678554][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1815.689393][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1815.702531][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1815.715586][T30327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1815.752021][T30327] 8021q: adding VLAN 0 to HW filter on device batadv0 01:41:52 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:52 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:52 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400827a0}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x120, r2, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}}}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4df362a5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2a}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3471c29c}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 01:41:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6000000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:52 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r3) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="05"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:52 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000540)="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") ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) 01:41:52 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x0) r1 = semget(0x1, 0x1, 0x200) semtimedop(r1, &(0x7f0000000180)=[{0x3, 0x81, 0x1800}, {0x7, 0x966a, 0x1000}, {0x0, 0x401, 0x1800}], 0x3, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x7f, 0x9, 0x4, 0x2, 0xffffffffffffc98a, 0x9, 0x3, 0x7, r2}, &(0x7f0000000140)=0x20) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000040)=0x9) r3 = geteuid() setfsuid(r3) bind$tipc(r0, &(0x7f0000000200)=@id={0x1e, 0x3, 0x3, {0x4e20}}, 0x10) 01:41:52 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000680)=[{&(0x7f0000000080)="2ab967f1d9996eebb9f6627d1e5be40349aad1fd1243", 0x16}, {&(0x7f00000000c0)="7aee4630a7c3cca260eecc63ba98a7c844797d037210781ebabeecbf2bd4755128a9306392f118109860dcabfe64482ae61370edc6843f78435d23086cfc6f85218368293bd6e22dd2ff288f921c36746db31b9671b9266261861bf9799665c188f53059ce1ce1466e00e54a0f262523213743afb775c4ad274f33208468bc16139f9c403725e71f6c6053804ed6da204bc9fce1995f98cb3fcaf27cfbfbfda92988017454960f53c1bfbc410ae149d5d9173bb0", 0xb4}, {&(0x7f00000002c0)="eb423cd6a833926750bb337447ed5bfe288ae17c3854ea0834b03caf400fa225115d4aec2aab38f61b7066c1c3bf591b2fa95255eb12de70925b14b958be705dd4ce8a7bc62076b8273eb8f727e6f2afc2", 0x51}, {&(0x7f0000000340)="e46f8ca26b8403c631cda8c89e8043d958c9e0bc4b95c995c0f6dd0336e06247201aa383529b2d2f31c49dcab8da1e119d74cb", 0x33}, {&(0x7f0000000380)="1b7831a2f299eea1caf2", 0xa}, {&(0x7f00000003c0)="f1b12da88bc6738363368bc555f52ccd37ef8a36a208c7c281e46ba86db5d263cddde20802e3a91e5fc8d57c1610130e742cb80b049c07e8c3c3416fd7d732a414c26ac8ac400b76cb81714ca8eab723fa2edce0ee6ed93808506d0eb1456b25905842e780ca91bd440f1ecd309cd690339b2038c217ee4660f475403c5ebd16e8278f59dd7cb2bca3c2dffe4dd96382a5d7f6f99f0e335200af8eb05f0e13f81f159761cab8377815e78fffcc2e331b2f99109f3f05f21c6aa29fa7e851e9ae2182f61fc768431cdf037beb6bd532742ec34f8021", 0xd5}, {&(0x7f00000004c0)="9b1834258800e4db47c3e8657099d5532084c1bfeb9fc149c03c73394446a6dac8841fccf8aa0b5f857b9c873ad416a63c43c09fdc3604ba8a6b9f73d9328a4026c42558280f8ed3957c69073915183fe13ba25768998a47b5f586136b94d4c12ef828b22815755c395a4028f9cb2047610621647843d4a12a3646d2f2e816eda49e809adb3a06ee9768e2f8766028ff9b69d689082bdcd1e6184e73414fe77204b31003173fc2fbb354d264e8798cb2f38843a860c0c67a2cfcc72b9a15a299db0f22327f9caf3da3f0a0f2db396dcc1d3f7a802d5b0910a1499d99d61e4e47cbd7a74c40", 0xe5}, {&(0x7f00000005c0)="f109b04c5025524307acde76501be450ffdcb66a67b4c3414469e5f824bfbf3aa9deffffc0318a96f6f862204f3438dbf6b729a92830f3f183c9d716abfe7e31dc1c502d9103b703ae960e9b921921c487c33394af20c6c568b74ff3844cc2a7250f6f66a5a6da53dea608feb1f2f04a1e2b46fec830f31b76c19de9", 0x7c}, {&(0x7f0000000640)="0d9a5023b54430329f7909173a4f9ce1fa964376b8599bbdba3602d0146b8d18c55257ded199666b7a233063d59007073ede229f84003e22a9e40612", 0x3c}], 0x9, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockname$netrom(r0, &(0x7f0000000780)={{0x3, @default}, [@rose, @rose, @bcast, @netrom, @rose, @netrom, @rose, @bcast]}, &(0x7f0000000800)=0x48) syz_execute_func(&(0x7f0000000180)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000740)={0x4, 0x3, 0x6d596a6a, 0x6, '\x00', 0x400}) 01:41:52 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)=@random={'security.', '\x00'}, &(0x7f0000000200)=""/81, 0x51) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000280)={0x7fff, 0x0, 0x303f, 0x7, 0x100, 0x6, 0x1ff, 0x1}) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x9effffff00000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:52 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:52 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400080, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000240)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200000, 0x0) r1 = geteuid() setfsuid(r1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000040)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) [ 1818.765027][ T26] audit: type=1800 audit(1556761313.711:156): pid=30807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16824 res=0 [ 1820.874419][T11867] device bridge_slave_1 left promiscuous mode [ 1820.880675][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1820.914722][T11867] device bridge_slave_0 left promiscuous mode [ 1820.921026][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1822.635459][T11867] device hsr_slave_1 left promiscuous mode [ 1822.689285][T11867] device hsr_slave_0 left promiscuous mode [ 1822.757146][T11867] team0 (unregistering): Port device team_slave_1 removed [ 1822.772131][T11867] team0 (unregistering): Port device team_slave_0 removed [ 1822.783823][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1822.808779][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1822.900309][T11867] bond0 (unregistering): Released all slaves [ 1823.010711][T30902] IPVS: ftp: loaded support on port[0] = 21 [ 1823.075980][T30902] chnl_net:caif_netlink_parms(): no params data found [ 1823.111181][T30902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1823.118470][T30902] bridge0: port 1(bridge_slave_0) entered disabled state [ 1823.126217][T30902] device bridge_slave_0 entered promiscuous mode [ 1823.134082][T30902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1823.141251][T30902] bridge0: port 2(bridge_slave_1) entered disabled state [ 1823.149314][T30902] device bridge_slave_1 entered promiscuous mode [ 1823.167933][T30902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1823.178543][T30902] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1823.199240][T30902] team0: Port device team_slave_0 added [ 1823.206448][T30902] team0: Port device team_slave_1 added [ 1823.288390][T30902] device hsr_slave_0 entered promiscuous mode [ 1823.324178][T30902] device hsr_slave_1 entered promiscuous mode [ 1823.378346][T30902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1823.385564][T30902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1823.392901][T30902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1823.400087][T30902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1823.471896][T30902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1823.483366][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1823.492252][T14087] bridge0: port 1(bridge_slave_0) entered disabled state [ 1823.501023][T14087] bridge0: port 2(bridge_slave_1) entered disabled state [ 1823.515622][T30902] 8021q: adding VLAN 0 to HW filter on device team0 [ 1823.527452][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1823.536770][T14087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1823.543909][T14087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1823.565997][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1823.575768][ T3037] bridge0: port 2(bridge_slave_1) entered blocking state [ 1823.582857][ T3037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1823.592155][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1823.611959][T30902] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1823.623153][T30902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1823.639609][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1823.648772][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1823.657849][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1823.667893][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1823.684513][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1823.699256][T30902] 8021q: adding VLAN 0 to HW filter on device batadv0 01:41:59 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:41:59 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") write$binfmt_misc(r0, &(0x7f0000000380)={'syz1', "19f36260a808d812c8a345de1aaecbecbb8f32841f22a54e3df6ed7bc743467de3fbfcf23da6c9e3a2bac8b6c1f16b758f904f158c766b12cb90fe96cd380d0790b7979d8313a03881898939ccfd490e8968fceb0bfa2398d510e55bfc667633cab18c7041f9fef6a2ad4a7048a331f2cbb70424a6923f48888ce51edb9dbb472ad89a187e04e5865e7bdcc922"}, 0x91) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000002c0)={0x0, @reserved}) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) 01:41:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xc00e000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:59 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = msgget(0x2, 0x6c) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000040)=""/35) setfsuid(r0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) 01:41:59 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e02000f000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:41:59 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x0, {0x2c, 0x0, 0x7}}, 0x14) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="009b945246709ba0386f3c2ef7b81335c41d974a3ffc9900ecc28150db491f0a67b09c123f539a122753ed8f6ba2f8c23c74da"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:41:59 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000000)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000440)) setresuid(r1, 0xfffe, r0) r3 = geteuid() setfsuid(r3) 01:41:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:59 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f00000000c0)={0x3}) r2 = getpid() process_vm_writev(r2, &(0x7f0000000840)=[{&(0x7f0000000540)}, {&(0x7f0000000580)=""/142, 0x8e}, {&(0x7f0000000640)=""/204, 0xcc}, {&(0x7f0000000740)}, {&(0x7f0000000780)=""/175, 0xaf}], 0x5, &(0x7f0000000a00)=[{&(0x7f00000008c0)=""/174, 0xae}, {&(0x7f0000000980)=""/122, 0x7a}], 0x2, 0x0) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000340)=""/238, 0xee) syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x0, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000440)=0x0) capset(&(0x7f0000000480)={0x19980330, r3}, &(0x7f00000004c0)={0x6, 0x5, 0x7, 0x1ff, 0x5, 0x80000001}) syz_execute_func(&(0x7f0000000180)="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") utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x9, 0x5}) r4 = getpgrp(0x0) syz_open_procfs(r4, &(0x7f0000000080)='net/ip_tables_matches\x00') 01:41:59 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) setfsuid(r0) 01:41:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf623000000000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:41:59 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1827.024350][T11867] device bridge_slave_1 left promiscuous mode [ 1827.030651][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.094940][T11867] device bridge_slave_0 left promiscuous mode [ 1827.101312][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1828.756775][T11867] device hsr_slave_1 left promiscuous mode [ 1828.799134][T11867] device hsr_slave_0 left promiscuous mode [ 1828.839803][T11867] team0 (unregistering): Port device team_slave_1 removed [ 1828.851281][T11867] team0 (unregistering): Port device team_slave_0 removed [ 1828.862680][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1828.900325][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1828.990513][T11867] bond0 (unregistering): Released all slaves [ 1829.121927][T31305] IPVS: ftp: loaded support on port[0] = 21 [ 1829.196782][T31305] chnl_net:caif_netlink_parms(): no params data found [ 1829.229441][T31305] bridge0: port 1(bridge_slave_0) entered blocking state [ 1829.237519][T31305] bridge0: port 1(bridge_slave_0) entered disabled state [ 1829.245447][T31305] device bridge_slave_0 entered promiscuous mode [ 1829.253336][T31305] bridge0: port 2(bridge_slave_1) entered blocking state [ 1829.260650][T31305] bridge0: port 2(bridge_slave_1) entered disabled state [ 1829.268611][T31305] device bridge_slave_1 entered promiscuous mode [ 1829.289139][T31305] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1829.299629][T31305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1829.323250][T31305] team0: Port device team_slave_0 added [ 1829.331037][T31305] team0: Port device team_slave_1 added [ 1829.415667][T31305] device hsr_slave_0 entered promiscuous mode [ 1829.464087][T31305] device hsr_slave_1 entered promiscuous mode [ 1829.596878][T31305] bridge0: port 2(bridge_slave_1) entered blocking state [ 1829.607588][T31305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1829.617745][T31305] bridge0: port 1(bridge_slave_0) entered blocking state [ 1829.624859][T31305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1829.661330][T31305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1829.677737][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1829.687443][ T3037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1829.695503][ T3037] bridge0: port 2(bridge_slave_1) entered disabled state [ 1829.709742][T31305] 8021q: adding VLAN 0 to HW filter on device team0 [ 1829.722287][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1829.731738][ T3037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1829.738922][ T3037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1829.766875][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1829.776156][T14089] bridge0: port 2(bridge_slave_1) entered blocking state [ 1829.783275][T14089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1829.811224][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1829.820806][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1829.835960][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1829.849038][T31305] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1829.862911][T31305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1829.877131][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1829.889008][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1829.912984][T31305] 8021q: adding VLAN 0 to HW filter on device batadv0 01:42:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='loginuid\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in6=@empty}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @initdev}, @in6=@ipv4={[], [], @multicast2}}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xf4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) setresuid(r2, 0xfffe, r3) r4 = geteuid() setfsuid(r4) 01:42:05 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x208000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)={r0, 0x0, 0x1000101002000, 0x100000000}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f00000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:05 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020060000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:05 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:05 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="47d99f1f43788ade0b38b4fff3235dc4"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:05 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) accept4$alg(r1, 0x0, 0x0, 0x80800) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0xa0) setfsuid(r0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0xd, 0x7, @tid=r2}, &(0x7f0000000080)) 01:42:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffffff00000000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:06 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) getpeername$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x23d7a71cffea876c) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x14c, 0xc946, 0x100000000, 0x10, r0, 0x0, [], 0x0, r0, 0x7, 0x27b3}, 0x3c) sendto$ax25(r0, &(0x7f0000000340)="6f71773e0de5c379b2d3778613329813f2375331e54c182fd208ae5dd99215b9718ea708000000000000e80a03126f71f796a5e14184c5f58eb3257635f7ce98d2f1731e8e2c31642542684af1de2d18ebcc709dd1ddb208ac8ad6ed45ff5e0056961aa81d4aa38b6d900417181e716ded74a11a526598521296002da5f4fa16d185495f4610a80865036a8009f69743e53f80dc6c327d1c57d1", 0x55, 0x40040, 0x0, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000300)) 01:42:06 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e0200e0000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:06 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x50010, r1, 0x0) 01:42:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffffffffffff000, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:06 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:06 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000080)="0f011c0f79fa650f01c80f20c06635020000000f22c0b809000f00d08fc960013d360f202466b8002000000f23d80f21f86635800000700f23f8b8f6000f00d0260f01d1", 0x44}], 0x1, 0x20, &(0x7f0000000140), 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:06 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) 01:42:06 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:06 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x1f80000000, 0x81, 0x5, 0x6, 0xb}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000380)={r3, @in={{0x2, 0x4e22, @loopback}}}, 0x84) 01:42:06 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) syz_execute_func(&(0x7f0000000180)="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") 01:42:06 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r2 = msgget(0x2, 0x21a) msgctl$IPC_RMID(r2, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x5) setfsuid(r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) 01:42:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:06 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:06 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setfsuid(r0) pselect6(0x40, &(0x7f0000000000)={0x9, 0x8000, 0x8, 0x2, 0xffffffffffffffcd, 0x4, 0x7ff, 0xfff}, &(0x7f0000000040)={0xf1, 0xb3, 0x1ff, 0x0, 0x1, 0x200, 0x7fffffff, 0x2}, &(0x7f0000000080)={0x9, 0xfffffffffffffffc, 0x14df, 0x1, 0x8, 0x800, 0x0, 0xffffffffffffffff}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={0x7f}, 0x8}) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000001c0)) [ 1833.884634][ T6832] device bridge_slave_1 left promiscuous mode [ 1833.890861][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1833.965046][ T6832] device bridge_slave_0 left promiscuous mode [ 1833.971313][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1835.656760][ T6832] device hsr_slave_1 left promiscuous mode [ 1835.727045][ T6832] device hsr_slave_0 left promiscuous mode [ 1835.799214][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 1835.811917][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 1835.825669][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1835.868873][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1835.982262][ T6832] bond0 (unregistering): Released all slaves [ 1836.101930][T32056] IPVS: ftp: loaded support on port[0] = 21 [ 1836.181261][T32056] chnl_net:caif_netlink_parms(): no params data found [ 1836.221700][T32056] bridge0: port 1(bridge_slave_0) entered blocking state [ 1836.228940][T32056] bridge0: port 1(bridge_slave_0) entered disabled state [ 1836.237027][T32056] device bridge_slave_0 entered promiscuous mode [ 1836.245401][T32056] bridge0: port 2(bridge_slave_1) entered blocking state [ 1836.252593][T32056] bridge0: port 2(bridge_slave_1) entered disabled state [ 1836.260343][T32056] device bridge_slave_1 entered promiscuous mode [ 1836.281243][T32056] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1836.300121][T32056] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1836.319708][T32056] team0: Port device team_slave_0 added [ 1836.326859][T32056] team0: Port device team_slave_1 added [ 1836.375540][T32056] device hsr_slave_0 entered promiscuous mode [ 1836.424216][T32056] device hsr_slave_1 entered promiscuous mode [ 1836.522256][T32056] bridge0: port 2(bridge_slave_1) entered blocking state [ 1836.529423][T32056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1836.537041][T32056] bridge0: port 1(bridge_slave_0) entered blocking state [ 1836.544205][T32056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1836.580925][T32056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1836.597359][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1836.609080][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1836.621507][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1836.638329][T32056] 8021q: adding VLAN 0 to HW filter on device team0 [ 1836.650439][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1836.659707][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1836.666865][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1836.687205][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1836.696345][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1836.703456][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1836.726415][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1836.736170][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1836.745110][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1836.755680][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1836.766912][T32056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1836.775915][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1836.798748][T32056] 8021q: adding VLAN 0 to HW filter on device batadv0 01:42:13 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:13 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f0000000180)="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") 01:42:13 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e0200000f0f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 01:42:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:13 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000040)=0x6e) r2 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x3) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:13 executing program 1: pause() syz_execute_func(&(0x7f0000000040)="c441f055ce64ff0941c3c409e125f87300006269f7a41d000000003a8e16649c675181617b12e564660f2ef4c442019dccd2111db8d3f5") syz_execute_func(&(0x7f0000000280)="470f52e94a2be9c4627d0ff9980f053ef3aec4a37bf0c50241e2e9450fe36a09c462c1e16d0cbc5dbc5d7d30ef90c20f561e221e2200262ff3906646da4e3200d25c6645dad809132525000e818f470f67450f289369000000b100673e66470f0fa219000000904df30f2cf18282e97c810f69e08f4cbec5c4c2858c3f8f560f01d4dfc5497dbf30470f866f2a37adc35959b427c4c189d4cdffffc4e111632a6ab4c4f2e9adc24cacac54ba16f2ae664e0f3a611b04c4c29d962150386c6cb336410fc1f1c4817d28ef491feefe8f08e4a25600b1500909660fdf530967410f58d1c481fde6ebe24343a1fa16a4d800000000660f19c646dce7440f704eee9864f2ff4ed03b7d0f12e400f4c4617be6d2c40379149c626db4000000bb2cbb610a09912af3430f47bb00000000000045126d6def946a5babb9c463d90d2408433e65660f5cb54c0a0000dd4805c462a52b6e0b8fa810ecd6091a1af20f78ac8fc978014bc365d085431fe7204577cb040ec4e2f92a5382f476767c1002970606b2aa263e0fafd6c422e6912cb1030474f30a070648070648eb27c4a2dd910cb11010217c29f936660f39058b976192361d09f4f5e58847910002c1045c0b47cc57ce5c0f1ea5322333332ef217640f28006c6c01a9bb000042d8fb4974ec0b31c461c9e86c4e1d3422") 01:42:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:14 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:14 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="14c2468233c5af730fe9bbced8b1edc30c7f67099dca395226e06e68ef0ca358bb186db5f0813e5b44af007366188c49f8f6f2ccb2c647a00ea19d1eace6558459256492f8508fd9829aae94548208c222dfb989beab365ee8f5c05d55544e96ba61d679097d205d25ec000000009c2de2427561d59ab303a8422bc611611254afae2fcccb138c4385bec234957bf5e777c55fe34a223fa489bde9c017"], 0x1) flistxattr(r1, &(0x7f0000000640)=""/210, 0xd2) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'U-', 0x8000}, 0x28, 0x2) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x10003, 0x3, 0xf002, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fchownat(r0, &(0x7f0000000040)='./bus\x00', r3, r4, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x1) 01:42:14 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1841.604553][ T6832] device bridge_slave_1 left promiscuous mode [ 1841.617554][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1841.674749][ T6832] device bridge_slave_0 left promiscuous mode [ 1841.680971][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.356088][ T6832] device hsr_slave_1 left promiscuous mode [ 1843.409065][ T6832] device hsr_slave_0 left promiscuous mode [ 1843.449665][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 1843.461265][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 1843.475750][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1843.539696][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1843.639816][ T6832] bond0 (unregistering): Released all slaves [ 1843.762913][T32608] IPVS: ftp: loaded support on port[0] = 21 [ 1843.823191][T32608] chnl_net:caif_netlink_parms(): no params data found [ 1843.863680][T32608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1843.870972][T32608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.878955][T32608] device bridge_slave_0 entered promiscuous mode [ 1843.887396][T32608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1843.894646][T32608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.902311][T32608] device bridge_slave_1 entered promiscuous mode [ 1843.922435][T32608] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1843.932885][T32608] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1843.951341][T32608] team0: Port device team_slave_0 added [ 1843.958646][T32608] team0: Port device team_slave_1 added [ 1844.006810][T32608] device hsr_slave_0 entered promiscuous mode [ 1844.074102][T32608] device hsr_slave_1 entered promiscuous mode [ 1844.163407][T32608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1844.170635][T32608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1844.178080][T32608] bridge0: port 1(bridge_slave_0) entered blocking state [ 1844.185234][T32608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1844.232352][T32608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1844.248987][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1844.258437][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1844.266990][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1844.288858][T32608] 8021q: adding VLAN 0 to HW filter on device team0 [ 1844.307676][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1844.322505][T14089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1844.329717][T14089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1844.360351][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1844.370761][ T3037] bridge0: port 2(bridge_slave_1) entered blocking state [ 1844.377947][ T3037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1844.410707][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1844.419801][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1844.435492][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1844.454939][T32608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1844.471523][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1844.481352][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1844.496400][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1844.530516][T32608] 8021q: adding VLAN 0 to HW filter on device batadv0 01:42:19 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:19 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:19 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:19 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000340)=0x2) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000440)={0x2, 0x1}) syz_execute_func(&(0x7f0000000180)="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") ioctl$RTC_UIE_OFF(r0, 0x7004) lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "10beb0352b1c06a42f1a2a1822c4e712"}, 0x11, 0x2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) 01:42:19 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10400) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:19 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:20 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0xe4, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x44e}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20}]}, 0xe4}}, 0x40000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:42:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:20 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000300f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) [ 1848.234701][ T6832] device bridge_slave_1 left promiscuous mode [ 1848.240941][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1848.294500][ T6832] device bridge_slave_0 left promiscuous mode [ 1848.300683][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.985555][ T6832] device hsr_slave_1 left promiscuous mode [ 1850.039326][ T6832] device hsr_slave_0 left promiscuous mode [ 1850.136703][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 1850.148188][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 1850.161238][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1850.239434][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1850.310527][ T6832] bond0 (unregistering): Released all slaves [ 1850.453089][ T488] IPVS: ftp: loaded support on port[0] = 21 [ 1850.525041][ T488] chnl_net:caif_netlink_parms(): no params data found [ 1850.559556][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1850.566843][ T488] bridge0: port 1(bridge_slave_0) entered disabled state [ 1850.574656][ T488] device bridge_slave_0 entered promiscuous mode [ 1850.582504][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1850.582577][ T488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1850.598714][ T488] device bridge_slave_1 entered promiscuous mode [ 1850.625714][ T488] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1850.635932][ T488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1850.653056][ T488] team0: Port device team_slave_0 added [ 1850.660794][ T488] team0: Port device team_slave_1 added [ 1850.716599][ T488] device hsr_slave_0 entered promiscuous mode [ 1850.756811][ T488] device hsr_slave_1 entered promiscuous mode [ 1850.847326][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1850.854491][ T488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1850.861866][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1850.869256][ T488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1850.910150][ T488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1850.932628][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1850.948080][T11073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1850.958639][T11073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1850.979524][ T488] 8021q: adding VLAN 0 to HW filter on device team0 [ 1850.993393][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1851.008948][T11073] bridge0: port 1(bridge_slave_0) entered blocking state [ 1851.016129][T11073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1851.050718][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1851.060057][T11073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1851.067218][T11073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1851.082684][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1851.102207][ T488] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1851.120408][ T488] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1851.133971][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1851.142149][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1851.158054][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1851.170487][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1851.194261][ T488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1851.203264][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:42:28 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:28 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c1247569bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 01:42:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:28 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:28 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000400f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:28 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e20, 0x9, @local, 0x5}], 0x4c) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) r4 = getgid() syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x2, 0x18000) getgroups(0x5, &(0x7f0000000040)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setregid(r4, r5) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000380)={0x3, 0x1, 0x3, 0x1, r6}, &(0x7f00000003c0)=0x10) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:28 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x81, 0x6, 0x1, 0x89, 0x0, 0x6, 0x2971, {0x0, @in6={{0xa, 0x4e21, 0x2ce, @loopback, 0x7}}, 0x4, 0x20, 0x0, 0x0, 0x6b64}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x33, 0x81}, &(0x7f00000003c0)=0x90) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400)={r2, 0x0, 0x5, 0x4}, 0x10) 01:42:28 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:28 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:28 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xd4, "15a859cc8605753b3d215e169f641c2b0343d879b43a39b0d2feeea113fddb5e5435afb6f90737d83724c9dd76d645b519e4a1983e8ad3aa76cfe21573b53167bab3df762327b02919b3fe5bc46ffb5e2c7973d061a7359f524eeb8c20312a76c56702d2ea608e782134209910bda8f03a6462249d4aa6031059756ad29335dc8366d9f098a7ef2979c7cfa6c44a165215225274f3727fa047a2d259a22183649ac72e7dc34b0009848c1b36c670c096ef84c0ed570a042f80470432eaa943c47e9a1efe5e83876df6e05469c9a4c811944bf592"}, &(0x7f00000002c0)=0xdc) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r1, 0x8, 0x8, 0x3}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:28 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) [ 1854.016863][ T26] audit: type=1800 audit(1556761348.961:157): pid=980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17201 res=0 [ 1856.344479][T11867] device bridge_slave_1 left promiscuous mode [ 1856.350796][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1856.404800][T11867] device bridge_slave_0 left promiscuous mode [ 1856.410994][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1858.096702][T11867] device hsr_slave_1 left promiscuous mode [ 1858.147433][T11867] device hsr_slave_0 left promiscuous mode [ 1858.199062][T11867] team0 (unregistering): Port device team_slave_1 removed [ 1858.210750][T11867] team0 (unregistering): Port device team_slave_0 removed [ 1858.223865][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1858.249242][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1858.341516][T11867] bond0 (unregistering): Released all slaves [ 1858.451183][ T1063] IPVS: ftp: loaded support on port[0] = 21 [ 1858.513300][ T1063] chnl_net:caif_netlink_parms(): no params data found [ 1858.547092][ T1063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1858.554442][ T1063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1858.562128][ T1063] device bridge_slave_0 entered promiscuous mode [ 1858.570014][ T1063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1858.577608][ T1063] bridge0: port 2(bridge_slave_1) entered disabled state [ 1858.585700][ T1063] device bridge_slave_1 entered promiscuous mode [ 1858.605794][ T1063] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1858.627056][ T1063] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1858.660982][ T1063] team0: Port device team_slave_0 added [ 1858.672943][ T1063] team0: Port device team_slave_1 added [ 1858.746515][ T1063] device hsr_slave_0 entered promiscuous mode [ 1858.813934][ T1063] device hsr_slave_1 entered promiscuous mode [ 1858.910374][ T1063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1858.917634][ T1063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1858.925040][ T1063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1858.932121][ T1063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1858.980457][ T1063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1858.995707][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1859.004680][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1859.012676][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1859.027960][ T1063] 8021q: adding VLAN 0 to HW filter on device team0 [ 1859.046197][T14089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1859.061692][T14089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1859.068979][T14089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1859.101269][ T2448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1859.110645][ T2448] bridge0: port 2(bridge_slave_1) entered blocking state [ 1859.117913][ T2448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1859.150973][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1859.160147][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1859.176200][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1859.195997][ T1063] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1859.212794][ T1063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1859.222510][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1859.237282][T14087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1859.263283][ T1063] 8021q: adding VLAN 0 to HW filter on device batadv0 01:42:35 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:35 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:35 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:35 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") write$binfmt_aout(r1, &(0x7f0000000340)={{0x0, 0x1, 0x9, 0x1d2, 0x29c, 0x10001, 0x2df, 0x7}, "d48fbadfec3591a1b7abc8c917f875494d12fd0cc6003e0d426a667857b5f51cdef8e0b7b1bdcbe4cd5365204836610b27fa169a8708de1bbdcd896accb6dd9f4b5bad6fbefd91c497127f854c6ededaf745d17a935dd80a5be02cb8d69afcfc5c83713cb22dfc302b74b5106a37d1a825a53d8bc8a1a772788e867990"}, 0x9d) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x101, &(0x7f0000000400)=0x4) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800804}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000428bd7000fbdbdf2501000000080003003a00000008000400680000000800040003000000080001004e220000080001004e23000008000400030083e9b8cb362ae631f513167e3d83"], 0x50}, 0x1, 0x0, 0x0, 0x400c010}, 0x4) 01:42:35 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x210080, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x17}, 0x56) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x9bb, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x100000000000000}, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x6, 0x6, 0x8}, &(0x7f0000000240)=0x20, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x7fffffff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r4, 0x4) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r1, &(0x7f0000000340)={0x7}, 0x7) 01:42:35 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:35 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="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") 01:42:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:35 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="d378a0fd60c8b44b5fcdd04f08335d2bcda50b012ee8535a606ceb40eafde3dc99d44252bfa543f81d69719635e2daf02ceedefe9acc440560585de22e56417c3be9860ba788d23a315ac0ea609eb409f2b2188cca663d9b49904613302706fc3ab96573c97ecbfbae53253b311f14914335c0d99e49f7d318ee543a8e69"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:35 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e0200e0ff0f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:36 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:36 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:36 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:36 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:36 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000000c0)=""/96) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x0, 0x21, 0x0, r0}) 01:42:36 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:36 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1861.441062][ T26] audit: type=1800 audit(1556761356.381:158): pid=1214 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16918 res=0 01:42:36 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x800, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000140)=0x1, 0x4) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x17}, 0x56) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e24, 0x400, @mcast1, 0x1}, {0xa, 0x4e23, 0x7fff, @local, 0x3}, 0x7, [0x10001, 0xc14, 0x9, 0xff, 0x8, 0x7fffffff, 0x2]}, 0x5c) write$P9_RREADLINK(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="0039867157e724e022fd11e54e62646a20f11ef114ac3403114d646cd3e2b1b35266c9ffe6503c38827b9d0c8249a1692e7dd5214ffe598576fbbe6a5c2c3719ee1c816941c76ab90a77e549e29675c4d4d7cbfc7dc1ba7d65cc0416418c5a"], 0x1) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000280)=""/43, &(0x7f0000000300)=0x2b) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) write$P9_RUNLINKAT(r1, &(0x7f0000000340)={0x7}, 0x7) 01:42:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:36 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:42:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:37 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:37 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)=0x200000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) syz_execute_func(&(0x7f0000000400)="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") 01:42:37 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:42:37 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:37 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:42:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1862.271884][ T26] audit: type=1800 audit(1556761357.211:159): pid=1584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16609 res=0 01:42:37 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:37 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:37 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="1469fe38f01663268bdfdeb85915519e545fc8355a0f79d08e5c0144a59e0555ff43687c735e9ac265bfd09121d22e82047936883a3ee4c3dd1695df8283272ae16c65ea51426e91cc32e7dc9c9089297bf48310689e4c408ab4b545d1137265c4a0377c9070e4b1b921daac296aede06e5d6c41ce2d024085da1c8913ea930c9fa8d41de6e0a2fa7659d72b06c723fa7753d3621e51b9c752eb9e201abc2f3a47b3e4aa8cc95ae766a017a802e2bac9dd35e2445158e11672b937b1334d1ca36486a5e411"], 0x1) r3 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r3, &(0x7f0000000000)={&(0x7f0000000140)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2000000000000000000000000700000044100900d84bd5dc0000000037000000"], 0x20}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x9, 0x3, 0x4}, 0xffffffffffffff08}}, 0x18) 01:42:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:37 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:37 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:37 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000002c0)=0x14, 0x4) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f00000000c0)={0x8f, 0x2}) syz_execute_func(&(0x7f0000000180)="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") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0xf40a, 0x3, 0x3, 0x5, 0x0, 0x1}, 0x20) epoll_pwait(r0, &(0x7f0000000140)=[{}, {}, {}], 0x3, 0x1ff, &(0x7f0000000080)={0x3}, 0x8) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000400)={r2, &(0x7f0000000340)=""/177}) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000440)=0x9, 0x4) 01:42:37 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000300f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:38 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:38 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:38 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000000c0)) r3 = msgget(0x2, 0xd1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() syz_open_dev$binder(&(0x7f00000005c0)='/dev/binder#\x00', 0x0, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000500)=0x0) r9 = getpgid(0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000540)={{0x9, r4, r5, r6, r7, 0x4, 0x5}, 0x7f, 0xf50, 0x8, 0xffff, 0x5, 0x5, r8, r9}) [ 1863.634517][ T26] audit: type=1800 audit(1556761358.581:160): pid=1835 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16593 res=0 01:42:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:38 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:38 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}, @in6={0xa, 0x4e23, 0x7, @local, 0x2}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e22, 0x0, @rand_addr="5d492dbea8bd8aef5ae6bc9ea6363ee7", 0x100000000}], 0x98) r1 = accept(r0, &(0x7f0000000880)=@rc, &(0x7f0000000900)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000940)={{{@in=@empty, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000a40)=0xe8) r2 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x42800) r3 = socket$inet_udplite(0x2, 0x2, 0x88) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) mount$9p_xen(&(0x7f0000000000)='[\x9b{user)posix_acl_access\x05selinuxselinuxmd5sum^md5sumsystemsystem]}\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80000, &(0x7f0000000a80)=ANY=[@ANYBLOB='trans=xen,afid=0x000000002e7510f8,access=user,dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',access=client,dfltuid=', @ANYRESHEX=r5, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB=',obj_role=/dev/snd/pcmC#D#p\x00,\x00']) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319b4c70e28bd5ab9246a8e8f98158f9abe95898db2635a47bb39d250500b82d49a6872064e056829fcbb93ceaf6ceb9e30dfd3d3773d63d7b24a9e53c9c71f63f1c2a697c6afea3eb8f11985c0fd9c5e06c1a4599eef1eee9a23a4a7e696e91b27ef6d1d688af6d721ef04477703bcd3713ac8b69f82ef04257c96c48892197d1099f27affc7ed79d7811a8103e1b591f8e19c82be9b795") syz_execute_func(&(0x7f0000000300)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") select(0x40, &(0x7f0000000780)={0x9, 0x4, 0x1000, 0xfffffffffffff800, 0x6, 0xf96, 0x0, 0x2}, &(0x7f00000007c0)={0x0, 0x5, 0x7, 0x4, 0xfff, 0x7ff, 0x9, 0x7f}, &(0x7f0000000800)={0x472, 0xd5, 0x4, 0x8, 0xcd3b, 0x0, 0x7, 0x3}, &(0x7f0000000840)) 01:42:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:39 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:39 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="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") 01:42:39 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000200)="dcde9914736cf83616e79ee09579f17b405063365622f672fe6c70c7b1a67c8801a1a58e406e92865f964811de57a65fe30c164de7d58ee0e7ff8c8f88b72a917bf7d4d059c7358edab52ba82503874db75a8d0bfe2f39f851d02bd46c6479930ea2149dd2eb2c724c657573012f5846a6ad3f708d9a7c07e63e56e86723619389b1fca1", 0x84) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000040)) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:39 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:39 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) [ 1864.730667][ T26] audit: type=1800 audit(1556761359.671:161): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16593 res=0 [ 1865.660787][ T26] audit: type=1800 audit(1556761360.601:162): pid=2422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16939 res=0 01:42:41 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000800c4a37bf0c51d41e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:41 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="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") getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x8, 0x4, 0x100, 0x20}, &(0x7f00000000c0)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x4, 0x2, 0x3, 0x5, r2}, &(0x7f0000000140)=0x10) 01:42:41 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:41 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa154b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:41 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040)="e216f343e29f37c8e16f0f19a03a5ceb0581116b4d2a3d0b5446994ff44888bcb24d2657d4d3fdbdc81899ef853b9866d03b81b7ed", &(0x7f0000000140)=""/35}, 0x18) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="e7911456471800b95c9c64a8093c7ebdaa1daf6c6cf9b948a7c5d5c8538f6f939b481082bd2cd8809bf73f5958fbe0169de4a0ffbf82877558f5ca0b9f797966acc1fa8e5842d06ceaf022bd2f4aff9a22c7006bb19b9bdc762345cda0ed35cba0f766d0403583d90e28b4cca245bc0aebc72ce4ec0831b8c6f6e3e66eac63f9ab71293f9b0512"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:41 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(0x0, 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:41 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="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") 01:42:41 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421035f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:41 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(0x0, 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1869.464575][ T7] device bridge_slave_1 left promiscuous mode [ 1869.470771][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1869.524874][ T7] device bridge_slave_0 left promiscuous mode [ 1869.531071][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1871.215588][ T7] device hsr_slave_1 left promiscuous mode [ 1871.257269][ T7] device hsr_slave_0 left promiscuous mode [ 1871.309694][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1871.321211][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1871.332565][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1871.397261][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1871.501270][ T7] bond0 (unregistering): Released all slaves [ 1871.611454][ T2873] IPVS: ftp: loaded support on port[0] = 21 [ 1871.675108][ T2873] chnl_net:caif_netlink_parms(): no params data found [ 1871.713387][ T2873] bridge0: port 1(bridge_slave_0) entered blocking state [ 1871.720672][ T2873] bridge0: port 1(bridge_slave_0) entered disabled state [ 1871.728768][ T2873] device bridge_slave_0 entered promiscuous mode [ 1871.738897][ T2873] bridge0: port 2(bridge_slave_1) entered blocking state [ 1871.747202][ T2873] bridge0: port 2(bridge_slave_1) entered disabled state [ 1871.755498][ T2873] device bridge_slave_1 entered promiscuous mode [ 1871.774273][ T2873] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1871.784561][ T2873] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1871.804005][ T2873] team0: Port device team_slave_0 added [ 1871.811334][ T2873] team0: Port device team_slave_1 added [ 1871.946379][ T2873] device hsr_slave_0 entered promiscuous mode [ 1871.994231][ T2873] device hsr_slave_1 entered promiscuous mode [ 1872.062942][ T2873] bridge0: port 2(bridge_slave_1) entered blocking state [ 1872.070117][ T2873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1872.077587][ T2873] bridge0: port 1(bridge_slave_0) entered blocking state [ 1872.084728][ T2873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1872.151340][ T2873] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1872.171722][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1872.187440][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1872.201690][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1872.225015][ T2873] 8021q: adding VLAN 0 to HW filter on device team0 [ 1872.237776][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1872.246643][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1872.253791][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1872.275905][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1872.285359][T11073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1872.292484][T11073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1872.301726][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1872.319984][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1872.328382][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1872.337579][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1872.350446][ T2873] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1872.363129][ T2873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1872.372110][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1872.401323][ T2873] 8021q: adding VLAN 0 to HW filter on device batadv0 01:42:49 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:49 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(0x0, 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:49 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:49 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000040)={0x10000, 0x1, 0x5}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000140)=0x7f, &(0x7f0000000200)=0x4) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:49 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x0, 0x2, 0x34, {}, 0x8, 0x7}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:49 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:49 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:49 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x8}, 0x1) syz_execute_func(&(0x7f0000000180)="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") 01:42:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:49 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000680)="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") [ 1875.216705][ T26] audit: type=1800 audit(1556761370.161:163): pid=3312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17377 res=0 [ 1877.814399][ T7] device bridge_slave_1 left promiscuous mode [ 1877.820651][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1877.854803][ T7] device bridge_slave_0 left promiscuous mode [ 1877.861053][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1879.546935][ T7] device hsr_slave_1 left promiscuous mode [ 1879.589338][ T7] device hsr_slave_0 left promiscuous mode [ 1879.648905][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1879.660712][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1879.680904][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1879.750380][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1879.850646][ T7] bond0 (unregistering): Released all slaves [ 1879.953485][ T3523] IPVS: ftp: loaded support on port[0] = 21 [ 1880.020568][ T3523] chnl_net:caif_netlink_parms(): no params data found [ 1880.054441][ T3523] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.061720][ T3523] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.069600][ T3523] device bridge_slave_0 entered promiscuous mode [ 1880.077806][ T3523] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.085841][ T3523] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.095245][ T3523] device bridge_slave_1 entered promiscuous mode [ 1880.122824][ T3523] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1880.132724][ T3523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1880.150969][ T3523] team0: Port device team_slave_0 added [ 1880.158573][ T3523] team0: Port device team_slave_1 added [ 1880.216859][ T3523] device hsr_slave_0 entered promiscuous mode [ 1880.254175][ T3523] device hsr_slave_1 entered promiscuous mode [ 1880.346090][ T3523] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.353190][ T3523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1880.360649][ T3523] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.367777][ T3523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1880.406712][ T3523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1880.422167][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1880.431470][T11073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1880.441079][T11073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1880.455550][ T3523] 8021q: adding VLAN 0 to HW filter on device team0 [ 1880.467787][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1880.477178][T11073] bridge0: port 1(bridge_slave_0) entered blocking state [ 1880.484363][T11073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1880.505257][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1880.515119][T11073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1880.522205][T11073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1880.546337][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1880.556109][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1880.565416][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1880.574964][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1880.585585][ T3523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1880.594355][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1880.630327][ T3523] 8021q: adding VLAN 0 to HW filter on device batadv0 01:42:56 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:56 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x1, 0x100000001}, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:56 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000380)={0x43, 0x9, 0x2, {0x2, 0x7, 0x6, 0x0, 0xffffffffe14cde32, 0x2, 0x9, 0x1e, 0x8000}}, 0x43) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x7fff, 0x200) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0x3316bb29) splice(r2, 0x0, r3, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="95391ce191979ed4ea8d1c"], 0x1) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x810, r1, 0x100000000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000400)='SEG6\x00') getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x55, "f735a2430c7ccd8302df6ad27d6381dda50d57a9c9a5cef6c724b3d65a73493ab9b60833457357161aa8638ca1b4f37d0226dd9ceb5a9f4555d3920facad49f5d0b11ac8148479ae544cbf447ef8d61cc205ddcdc9"}, &(0x7f0000000200)=0x5d) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000240)={r4, 0x8}, &(0x7f0000000280)=0x8) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:56 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:56 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="984a2ae92c18104c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c20400c442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:56 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc0e123c123f319bd05f") syz_execute_func(&(0x7f0000000180)="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") [ 1881.604384][ T26] audit: type=1400 audit(1556761376.541:164): avc: denied { sys_admin } for pid=3555 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:42:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:56 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x0) syz_execute_func(&(0x7f0000000180)="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") socket$inet_udplite(0x2, 0x2, 0x88) [ 1881.753111][ T26] audit: type=1400 audit(1556761376.691:165): avc: denied { map } for pid=3532 comm="syz-executor.2" path="/dev/dmmidi7" dev="devtmpfs" ino=303199 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:device_t:s0 tclass=file permissive=1 01:42:56 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) fanotify_mark(r0, 0x80, 0x8, r0, &(0x7f0000000040)='./bus\x00') 01:42:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:56 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = getpgid(0xffffffffffffffff) fcntl$setown(r1, 0x8, r2) ioctl(r1, 0x204, &(0x7f00000000c0)="0adc1f122d123f319bd070") ioctl$TIOCEXCL(r0, 0x540c) syz_execute_func(&(0x7f0000000400)="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") ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) 01:42:57 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:57 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000004, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x101000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000140)={r2, &(0x7f0000000100)=""/61}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") fcntl$getflags(r0, 0x401) 01:42:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:57 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:57 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0x10000001f) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x5, 0x40) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) r3 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xe, &(0x7f0000000040)='security^ppp1\x00', 0xffffffffffffffff}, 0x30) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000200)={r0, r1, 0xffffffff}) 01:42:57 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x401, 0xfffffffffffffffc) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000700)={0x5, &(0x7f0000000040)=""/146, &(0x7f0000000680)=[{0x7, 0xde, 0x2360000, &(0x7f00000002c0)=""/222}, {0xffffffff, 0xcb, 0x100000000, &(0x7f00000003c0)=""/203}, {0x7e, 0x39, 0x2, &(0x7f0000000140)=""/57}, {0x6, 0xed, 0x9, &(0x7f00000004c0)=""/237}, {0x2, 0xbd, 0x3, &(0x7f00000005c0)=""/189}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='status\x00') ioctl$RTC_UIE_OFF(r0, 0x7004) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x448240, 0x0) ftruncate(r2, 0x2000b) syz_execute_func(&(0x7f0000000180)="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") 01:42:58 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', r1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") select(0x40, &(0x7f0000000040)={0xcd7, 0x7fffffff, 0x2, 0x4, 0x1, 0x94, 0x20, 0x3ff}, &(0x7f00000003c0)={0x10000, 0xffffffff, 0x7f, 0xb4, 0xfff, 0xe9a8, 0x7ff, 0x9}, &(0x7f0000000400)={0x52, 0x7f, 0x4, 0x6, 0x200, 0x8, 0x2, 0x7255}, &(0x7f0000000440)={0x77359400}) syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:42:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:58 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x3e) accept$alg(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x4f, 0x0, [], {0x0, @reserved}}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) 01:42:58 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x8000000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1883.368097][ T26] audit: type=1804 audit(1556761378.311:166): pid=3830 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir432751316/syzkaller.eQuxkB/1171/file0" dev="sda1" ino=16956 res=1 01:42:59 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:42:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:59 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0xaed0, 0x100000001, 0x4, 0x4, 0x401}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40200, 0x0) 01:42:59 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x1}, 0x14) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:42:59 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fchmod(r1, 0x15) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000000c0)=""/139) getuid() setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x8d, 0x4) write$binfmt_elf64(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="7f454c463f010404617600000000000002003e00aeee00004f010000000000004000000000000000f80200000000000056d900000b00380002008000faff090002000000810f0000d4650000000000000100000000000000ffffff7f0000000000000000000000000800000000000000ff0f000000000000000000700000010007000000000000000700000000000000680f0000000000000800000000000000020000000000000004000000000000004eeeb5a0ac81778e7daa997c30c97c534cbb3eadc07808379f2db945384bd55685c1e637dda36655ba2e138af4877ac0a935be0b01479777dfc5ed12a54ad001a8330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aabceca4a13072900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006114689f9f8e79e6908c0bb821835f3feec76a65d0dd3f3be1586fe879ce8e7dbcdcfc693aefe65d175f7d7a42d92d1a2e6a54551b328d62aca52d055d32367104b307816ca103a215af0daa67939f0613aa5d52c4ac5f0187bfca4521b7f8ffb73924816993cc87b9aeed5a3a34800d63c1df48dabd53d5741bc782742f183c8c02449b452ee3043ce757ea36c5d6c420fa5421a51433aaa6c45faaff9043e864d6838c856010ff458a45519f654ea38942ebbe7f211c0ff0fe79e15f146ece0abd805f5b5d99d88874d3da894f311087da7926e4d54a2e0efd"], 0x4f2) syz_execute_func(&(0x7f0000000900)="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") 01:42:59 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:59 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") signalfd4(r0, &(0x7f0000000080)={0x9}, 0x8, 0x800) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 01:42:59 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) 01:42:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:42:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000040)={0xe7, "2f6a84b6a7ff52641cbc901677f8e273f02b5cd117ca47ddbc244f7712086ba8"}) 01:43:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:00 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(0xffffffffffffffff, &(0x7f0000000180), r0, 0x0, 0x80000001, 0x0) [ 1887.864497][ T2993] device bridge_slave_1 left promiscuous mode [ 1887.870687][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1887.924693][ T2993] device bridge_slave_0 left promiscuous mode [ 1887.931129][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1889.566704][ T2993] device hsr_slave_1 left promiscuous mode [ 1889.609156][ T2993] device hsr_slave_0 left promiscuous mode [ 1889.668630][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1889.680182][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1889.692235][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1889.730643][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1889.819706][ T2993] bond0 (unregistering): Released all slaves [ 1889.921846][ T4310] IPVS: ftp: loaded support on port[0] = 21 [ 1889.989716][ T4310] chnl_net:caif_netlink_parms(): no params data found [ 1890.021150][ T4310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1890.028387][ T4310] bridge0: port 1(bridge_slave_0) entered disabled state [ 1890.036466][ T4310] device bridge_slave_0 entered promiscuous mode [ 1890.044455][ T4310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.051622][ T4310] bridge0: port 2(bridge_slave_1) entered disabled state [ 1890.059717][ T4310] device bridge_slave_1 entered promiscuous mode [ 1890.081144][ T4310] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1890.091780][ T4310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1890.112069][ T4310] team0: Port device team_slave_0 added [ 1890.120947][ T4310] team0: Port device team_slave_1 added [ 1890.200224][ T4310] device hsr_slave_0 entered promiscuous mode [ 1890.265388][ T4310] device hsr_slave_1 entered promiscuous mode [ 1890.348928][ T4310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.356127][ T4310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1890.363506][ T4310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1890.370667][ T4310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1890.416905][ T4310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1890.432539][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1890.442410][ T4039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1890.451185][ T4039] bridge0: port 2(bridge_slave_1) entered disabled state [ 1890.479484][ T4310] 8021q: adding VLAN 0 to HW filter on device team0 [ 1890.491482][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1890.500709][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 1890.507899][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1890.534863][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1890.543370][ T4039] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.550558][ T4039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1890.560129][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1890.569549][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1890.583141][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1890.599673][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1890.617929][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1890.631111][ T4310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1890.673355][ T4310] 8021q: adding VLAN 0 to HW filter on device batadv0 01:43:06 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:06 executing program 2: pause() syz_execute_func(&(0x7f00000003c0)="3666440f50f564ff0941c36664660f3815350c000000c46269f7a41d000000003a8e16649c675181617b12e56466f047802a00c442019dccc4017e126abc1db8d36f") syz_execute_func(&(0x7f0000001040)="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") 01:43:06 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 01:43:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r0, 0x0, 0x80000001, 0x0) 01:43:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:06 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xabc, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x101) syz_execute_func(&(0x7f0000000180)="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") 01:43:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r0, 0x0, 0x80000001, 0x0) 01:43:07 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000080)=""/140) 01:43:07 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:43:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r0, 0x0, 0x80000001, 0x0) 01:43:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:07 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:43:08 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:08 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000180)={{0x4, 0x7}, {0x3ff, 0x7ff}, 0x1, 0x6, 0x2}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2a6b4000, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000080)) 01:43:08 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:43:08 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000002c0)=""/234, &(0x7f0000000100)=0xea) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000004c0)={0x0, 0x7ff}, 0xfffffffffffffe28) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000080)={0x3, 0x3, 0x5, 0x5}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x400000000000, 0x4000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f00000000c0)='./file0\x00', r2}, 0x10) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000003c0)={0x0, 0x1, [0x1, 0x3, 0x80000001, 0xfe, 0x9, 0x6, 0x40, 0xffffffffffffffc1]}) 01:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 01:43:08 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1105511, &(0x7f0000000400)) 01:43:08 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 01:43:08 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x42100, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="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") ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000002c0)={{0x3, 0x3, 0x1ff, 0x3, 0x7}, 0x9, 0x100, 'id0\x00', 'timer0\x00', 0x0, 0x2e08c84a, 0x6, 0x3ff, 0x10001}) 01:43:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:08 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) getuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000540)="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") ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000080)={0x8, 0x3, 0x8001}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000100)={0x6000, 0x115000}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) fcntl$setown(r0, 0x8, r2) 01:43:09 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x0, 0x0) 01:43:09 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:09 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$SIOCAX25CTLCON(r0, 0x89e2, 0x0) 01:43:09 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="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") 01:43:09 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x0, 0x0) 01:43:09 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="984a2ae92c18965e0f056b6b03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c482792336d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:09 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000180), r0, 0x0, 0x0, 0x0) 01:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2, 0x0, 0x0, 0x0, 0xa3}, 0x20) 01:43:09 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x5, 0x0, [], [{0x6, 0x7f4c, 0x21, 0x3, 0x1aa4, 0x100}, {0x7, 0x5, 0x780, 0x3, 0x8, 0x1}], [[], [], [], [], []]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0xfffffffffffffbff, 0x8, 0x6, 0x5, 0x400}) syz_execute_func(&(0x7f0000000180)="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") 01:43:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:10 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x8e6a) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 1895.175642][ T5237] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1895.367727][ T5237] syz-executor.1 (5237) used greatest stack depth: 22376 bytes left 01:43:10 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") [ 1897.774669][ T2993] device bridge_slave_1 left promiscuous mode [ 1897.781889][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1897.854917][ T2993] device bridge_slave_0 left promiscuous mode [ 1897.861212][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1899.596816][ T2993] device hsr_slave_1 left promiscuous mode [ 1899.639491][ T2993] device hsr_slave_0 left promiscuous mode [ 1899.698977][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1899.711893][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1899.730548][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1899.770079][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1899.871711][ T2993] bond0 (unregistering): Released all slaves [ 1899.972592][ T5296] IPVS: ftp: loaded support on port[0] = 21 [ 1900.044579][ T5296] chnl_net:caif_netlink_parms(): no params data found [ 1900.079025][ T5296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.087103][ T5296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1900.096195][ T5296] device bridge_slave_0 entered promiscuous mode [ 1900.106121][ T5296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.113533][ T5296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1900.122019][ T5296] device bridge_slave_1 entered promiscuous mode [ 1900.143770][ T5296] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1900.154882][ T5296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1900.177397][ T5296] team0: Port device team_slave_0 added [ 1900.185694][ T5296] team0: Port device team_slave_1 added [ 1900.246402][ T5296] device hsr_slave_0 entered promiscuous mode [ 1900.304300][ T5296] device hsr_slave_1 entered promiscuous mode [ 1900.419257][ T5296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.427010][ T5296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1900.434999][ T5296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.442414][ T5296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1900.480879][ T5296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1900.496993][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1900.507511][T14083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1900.517113][T14083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1900.532828][ T5296] 8021q: adding VLAN 0 to HW filter on device team0 [ 1900.549298][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1900.562274][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.570091][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1900.601067][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1900.611355][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.619308][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1900.645209][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1900.661295][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1900.686117][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1900.701917][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1900.715984][ T5296] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1900.734911][ T5296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1900.750736][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1900.782566][ T5296] 8021q: adding VLAN 0 to HW filter on device batadv0 01:43:17 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:17 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x245, 0x800) 01:43:17 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x804000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2) 01:43:17 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x7, {0x6, 0x80000001, 0x7, 0x9, 0x7f, 0x80000000}, 0x8ae, 0x2}, 0xe) 01:43:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:17 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x48, r2, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffff}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 01:43:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:17 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x6, 0x3, 0x4, 0x8, 0xffffffffffffffff, 0x9, [], 0x0, r0, 0x40, 0x8000}, 0x3c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") [ 1905.504692][ T2993] device bridge_slave_1 left promiscuous mode [ 1905.511199][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1905.544994][ T2993] device bridge_slave_0 left promiscuous mode [ 1905.551696][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1907.225795][ T2993] device hsr_slave_1 left promiscuous mode [ 1907.279315][ T2993] device hsr_slave_0 left promiscuous mode [ 1907.316718][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1907.329971][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1907.341260][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1907.379313][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1907.470866][ T2993] bond0 (unregistering): Released all slaves [ 1907.582644][ T5826] IPVS: ftp: loaded support on port[0] = 21 [ 1907.662697][ T5826] chnl_net:caif_netlink_parms(): no params data found [ 1907.695037][ T5826] bridge0: port 1(bridge_slave_0) entered blocking state [ 1907.702199][ T5826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1907.710212][ T5826] device bridge_slave_0 entered promiscuous mode [ 1907.777964][ T5826] bridge0: port 2(bridge_slave_1) entered blocking state [ 1907.785300][ T5826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1907.793005][ T5826] device bridge_slave_1 entered promiscuous mode [ 1907.810869][ T5826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1907.821332][ T5826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1907.852333][ T5826] team0: Port device team_slave_0 added [ 1907.862731][ T5826] team0: Port device team_slave_1 added [ 1907.936345][ T5826] device hsr_slave_0 entered promiscuous mode [ 1907.974819][ T5826] device hsr_slave_1 entered promiscuous mode [ 1908.030767][ T5826] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.038039][ T5826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1908.045583][ T5826] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.052676][ T5826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1908.120818][ T5826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1908.147959][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1908.162704][T14083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1908.172285][T14083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1908.194620][ T5826] 8021q: adding VLAN 0 to HW filter on device team0 [ 1908.217681][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1908.232608][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.239781][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1908.271038][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1908.281427][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.288643][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1908.322819][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1908.332222][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1908.347683][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1908.359502][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1908.374135][ T5826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1908.390206][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1908.419141][ T5826] 8021q: adding VLAN 0 to HW filter on device batadv0 01:43:25 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:25 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x101, 0xff, 0x20, 0x13, 0x0, 0xab30, 0x1, 0xd, 0x6, 0x3f, 0x80, 0x0, 0x1f, 0x5, 0x4, 0x1, 0xefe, 0x2, 0x6, 0x10a9c00000000000, 0x7, 0x0, 0x1, 0xffffffffffffffc0, 0x9, 0x7, 0x4, 0x3f, 0x7, 0x7, 0x5, 0x6, 0x1, 0x4, 0x3d84, 0x5, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x28002, 0x1, 0x2, 0x3, 0x3, 0x7fff, 0x40}, r1, 0x9, r0, 0xb) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x8, 0x0, 0x4, 0x40, {}, {0x9ded851a87ca5e50, 0x1, 0x4, 0x6, 0x2, 0x8, "1eb4960c"}, 0x7, 0x7, @userptr=0x8, 0x4}) syz_execute_func(&(0x7f0000000180)="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") 01:43:25 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x245, 0x800) 01:43:25 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x101000001, 0x2000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:25 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$cont(0x4, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getpeername(r1, &(0x7f00000002c0)=@can={0x1d, 0x0}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000340)={@broadcast, @remote, r2}, 0xc) accept4$ax25(r1, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @bcast, @default, @null, @remote, @bcast, @netrom]}, &(0x7f0000000100)=0x48, 0x80800) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:25 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x849, &(0x7f0000000080)="0adc1f123c123f319bd0703457e7aec48ac013c37ac93c342a5c79d69958f5f3afbdf1ed7f2cc8a949b8b99b16c360b33cb7d84c1ab762437a3663cc821266c499cbaa3f6b30fb0d1b57b162ce10fa585d52bcc2ccacfed9f128b7114f81fef745bd017708c3736b61c3a26f33be06d3eef0da14693a9ed974b44eab4c1a7359b1b1") syz_execute_func(&(0x7f0000000180)="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") 01:43:25 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 1913.244580][T11867] device bridge_slave_1 left promiscuous mode [ 1913.250849][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1913.314816][T11867] device bridge_slave_0 left promiscuous mode [ 1913.321012][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1914.996907][T11867] device hsr_slave_1 left promiscuous mode [ 1915.039218][T11867] device hsr_slave_0 left promiscuous mode [ 1915.087228][T11867] team0 (unregistering): Port device team_slave_1 removed [ 1915.100753][T11867] team0 (unregistering): Port device team_slave_0 removed [ 1915.112326][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1915.177678][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1915.280832][T11867] bond0 (unregistering): Released all slaves [ 1915.371878][ T6402] IPVS: ftp: loaded support on port[0] = 21 [ 1915.451425][ T6402] chnl_net:caif_netlink_parms(): no params data found [ 1915.482859][ T6402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1915.490263][ T6402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1915.498196][ T6402] device bridge_slave_0 entered promiscuous mode [ 1915.506231][ T6402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1915.513405][ T6402] bridge0: port 2(bridge_slave_1) entered disabled state [ 1915.521154][ T6402] device bridge_slave_1 entered promiscuous mode [ 1915.544920][ T6402] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1915.555481][ T6402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1915.574328][ T6402] team0: Port device team_slave_0 added [ 1915.581553][ T6402] team0: Port device team_slave_1 added [ 1915.666388][ T6402] device hsr_slave_0 entered promiscuous mode [ 1915.734072][ T6402] device hsr_slave_1 entered promiscuous mode [ 1915.883246][ T6402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1915.890434][ T6402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1915.897861][ T6402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1915.904957][ T6402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1915.939653][ T6402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1915.955719][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1915.964983][ T3976] bridge0: port 1(bridge_slave_0) entered disabled state [ 1915.972911][ T3976] bridge0: port 2(bridge_slave_1) entered disabled state [ 1915.987011][ T6402] 8021q: adding VLAN 0 to HW filter on device team0 [ 1915.999232][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1916.008337][ T3976] bridge0: port 1(bridge_slave_0) entered blocking state [ 1916.015503][ T3976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1916.034350][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1916.044639][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 1916.051732][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1916.075098][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1916.084504][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1916.093138][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1916.101761][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1916.112344][ T6402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1916.124845][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1916.147815][ T6402] 8021q: adding VLAN 0 to HW filter on device batadv0 01:43:33 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c2302004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:33 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x245, 0x800) 01:43:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:33 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000040)={0x2, 0x8000}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f0600123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:33 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="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") 01:43:33 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:33 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b18e91cd806c69dc00d9d9d0450f18c00fc4014c58c4a1e96be7c44149f216c421fc51c1ea01efc48192558dc3c36645c4c1e173fb6526430f3a0f19f1400fae28787c3e460f569f000000001de2013d8952522e9b01000000c401fe5ff6c4a27d33e46467366766b3430fefb3040000000804f4c4837d1118fbc40213f5930a0000000013a4001369879f000000fe") ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:33 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") getsockopt$netlink(r0, 0x10e, 0x6, &(0x7f0000000080)=""/121, &(0x7f0000000100)=0x79) 01:43:33 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x245, 0x800) 01:43:33 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:33 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="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") [ 1921.334607][ T7] device bridge_slave_1 left promiscuous mode [ 1921.340816][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.394819][ T7] device bridge_slave_0 left promiscuous mode [ 1921.401090][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1923.086729][ T7] device hsr_slave_1 left promiscuous mode [ 1923.157262][ T7] device hsr_slave_0 left promiscuous mode [ 1923.199487][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1923.210974][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1923.222520][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1923.260251][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1923.360234][ T7] bond0 (unregistering): Released all slaves [ 1923.481464][ T6954] IPVS: ftp: loaded support on port[0] = 21 [ 1923.545960][ T6954] chnl_net:caif_netlink_parms(): no params data found [ 1923.577806][ T6954] bridge0: port 1(bridge_slave_0) entered blocking state [ 1923.585067][ T6954] bridge0: port 1(bridge_slave_0) entered disabled state [ 1923.592761][ T6954] device bridge_slave_0 entered promiscuous mode [ 1923.600852][ T6954] bridge0: port 2(bridge_slave_1) entered blocking state [ 1923.608154][ T6954] bridge0: port 2(bridge_slave_1) entered disabled state [ 1923.616232][ T6954] device bridge_slave_1 entered promiscuous mode [ 1923.635704][ T6954] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1923.646742][ T6954] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1923.668464][ T6954] team0: Port device team_slave_0 added [ 1923.676747][ T6954] team0: Port device team_slave_1 added [ 1923.736274][ T6954] device hsr_slave_0 entered promiscuous mode [ 1923.773939][ T6954] device hsr_slave_1 entered promiscuous mode [ 1923.836518][ T6954] bridge0: port 2(bridge_slave_1) entered blocking state [ 1923.843677][ T6954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1923.850990][ T6954] bridge0: port 1(bridge_slave_0) entered blocking state [ 1923.858135][ T6954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1923.940803][ T6954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1923.962094][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1923.977519][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1923.989439][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 1924.007599][ T6954] 8021q: adding VLAN 0 to HW filter on device team0 [ 1924.019800][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1924.029317][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 1924.036512][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1924.065433][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1924.075299][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1924.082393][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1924.091721][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1924.117684][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1924.129552][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1924.141600][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1924.161326][ T6954] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1924.179508][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1924.189380][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1924.230695][ T6954] 8021q: adding VLAN 0 to HW filter on device batadv0 01:43:40 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="0f0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:40 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:40 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000080)="6cd06d0332c60aad9b257165204fdf68e3ed869eb9fbd6ce8c140cd23caa93d3bf901400000000") syz_execute_func(&(0x7f0000000180)="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") 01:43:40 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:40 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x3, 0x204) semop(r1, &(0x7f0000000100)=[{0x4, 0x7fff, 0x1800}, {0x4, 0x3e, 0x800}, {0x2, 0x5, 0x800}, {0x3, 0x9, 0x800}, {0x0, 0xfffffffffffffffd, 0x800}, {0x3, 0x3, 0x66ee6e5e0d8c8d7}, {0x2, 0xecfb}, {0x1, 0x2, 0x1000}], 0x8) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x5, 0x7f, 0x1, 0x10000}}) syz_execute_func(&(0x7f0000000180)="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") openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) 01:43:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="140000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:40 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:40 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1, 0x10000) socket$inet_udplite(0x2, 0x2, 0x88) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '.\x00'}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:40 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000890e, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@multicast2, 0x4e22, 0x0, 0x4e23, 0x0, 0xa, 0xa0, 0xa0, 0x67, r2, r3}, {0x3, 0x8, 0x5, 0xcda6, 0x7, 0x2, 0x1ff, 0x401}, {0x2, 0x6, 0x9, 0x9}, 0x4, 0x6e6bb2, 0x3, 0x0, 0x1, 0x2}, {{@in6=@empty, 0x4d4, 0x3c}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3504, 0x3, 0x2, 0x3, 0xffffffffffffffc0, 0xffffffffffffffc1, 0x8}}, 0xe8) fsync(r0) 01:43:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) [ 1928.624516][ T7] device bridge_slave_1 left promiscuous mode [ 1928.630779][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1928.684778][ T7] device bridge_slave_0 left promiscuous mode [ 1928.690993][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1930.386814][ T7] device hsr_slave_1 left promiscuous mode [ 1930.456973][ T7] device hsr_slave_0 left promiscuous mode [ 1930.509184][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1930.521394][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1930.533819][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1930.589707][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1930.679957][ T7] bond0 (unregistering): Released all slaves [ 1930.812708][ T7373] IPVS: ftp: loaded support on port[0] = 21 [ 1930.876873][ T7373] chnl_net:caif_netlink_parms(): no params data found [ 1930.908246][ T7373] bridge0: port 1(bridge_slave_0) entered blocking state [ 1930.916323][ T7373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1930.924383][ T7373] device bridge_slave_0 entered promiscuous mode [ 1930.932161][ T7373] bridge0: port 2(bridge_slave_1) entered blocking state [ 1930.939506][ T7373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1930.947291][ T7373] device bridge_slave_1 entered promiscuous mode [ 1930.973302][ T7373] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1930.985443][ T7373] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1931.001777][ T7373] team0: Port device team_slave_0 added [ 1931.009370][ T7373] team0: Port device team_slave_1 added [ 1931.116718][ T7373] device hsr_slave_0 entered promiscuous mode [ 1931.169839][ T7373] device hsr_slave_1 entered promiscuous mode [ 1931.241099][ T7373] bridge0: port 2(bridge_slave_1) entered blocking state [ 1931.248295][ T7373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1931.255756][ T7373] bridge0: port 1(bridge_slave_0) entered blocking state [ 1931.262853][ T7373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1931.339065][ T7373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1931.361745][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1931.372705][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1931.388054][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1931.405864][ T7373] 8021q: adding VLAN 0 to HW filter on device team0 [ 1931.424429][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1931.433490][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1931.440680][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1931.471250][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1931.482389][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1931.489596][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1931.519445][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1931.531260][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1931.558475][ T7373] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1931.573404][ T7373] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1931.591804][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1931.601003][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1931.616429][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1931.642086][ T7373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1931.651113][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:43:48 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0223004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="300000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:48 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:48 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x84000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x58, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}, @in6={0xa, 0x4e20, 0x8000, @empty, 0x8000}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x2, 0x8001, 0x5, 0x6, 0x6}, 0x14) 01:43:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:48 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:48 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'\x00', {0x2, 0x4e20, @empty}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:48 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="0aad1f12bc1247319b19edef20c041c20cd62367f07fc28b902d1ef100d29f942de3493f70719c1bd4e2865f5fc7ccb672db00c818eab499708881bb2a831ab230a3f18309075d40294626c3ab1695616fbf3d497c77ab059cf23c7eac8d127aaab84687e413e7981642ad9fc706b2130abf89de40972283141de277c68194797b29acc5413a841a86105f223f9452f06537445613e4facbc069b7147b5475fcbf4ecad38265691eb8b68717be54d0f40cfe3e65bdb2e70a6d8f97165ad23702783241a04b2466a04325982b93dfde017793483fe41761c311643dbe740abf0befb46c") syz_execute_func(&(0x7f0000000180)="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") 01:43:48 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="c00000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="230200002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1935.974516][ T6832] device bridge_slave_1 left promiscuous mode [ 1935.980717][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1936.054829][ T6832] device bridge_slave_0 left promiscuous mode [ 1936.061029][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1937.736725][ T6832] device hsr_slave_1 left promiscuous mode [ 1937.807334][ T6832] device hsr_slave_0 left promiscuous mode [ 1937.859137][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 1937.870729][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 1937.882808][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1937.939810][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1938.018473][ T6832] bond0 (unregistering): Released all slaves [ 1938.113757][ T7808] IPVS: ftp: loaded support on port[0] = 21 [ 1938.174962][ T7808] chnl_net:caif_netlink_parms(): no params data found [ 1938.218546][ T7808] bridge0: port 1(bridge_slave_0) entered blocking state [ 1938.225819][ T7808] bridge0: port 1(bridge_slave_0) entered disabled state [ 1938.233480][ T7808] device bridge_slave_0 entered promiscuous mode [ 1938.241505][ T7808] bridge0: port 2(bridge_slave_1) entered blocking state [ 1938.248815][ T7808] bridge0: port 2(bridge_slave_1) entered disabled state [ 1938.256899][ T7808] device bridge_slave_1 entered promiscuous mode [ 1938.276723][ T7808] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1938.287149][ T7808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1938.304617][ T7808] team0: Port device team_slave_0 added [ 1938.311920][ T7808] team0: Port device team_slave_1 added [ 1938.366510][ T7808] device hsr_slave_0 entered promiscuous mode [ 1938.403949][ T7808] device hsr_slave_1 entered promiscuous mode [ 1938.529837][ T7808] bridge0: port 2(bridge_slave_1) entered blocking state [ 1938.536977][ T7808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1938.544396][ T7808] bridge0: port 1(bridge_slave_0) entered blocking state [ 1938.551473][ T7808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1938.597029][ T7808] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1938.611877][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1938.621298][ T3976] bridge0: port 1(bridge_slave_0) entered disabled state [ 1938.636415][ T3976] bridge0: port 2(bridge_slave_1) entered disabled state [ 1938.655400][ T7808] 8021q: adding VLAN 0 to HW filter on device team0 [ 1938.673494][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1938.689906][ T3976] bridge0: port 1(bridge_slave_0) entered blocking state [ 1938.697085][ T3976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1938.718409][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1938.733436][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 1938.740630][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1938.768775][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1938.785500][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1938.795487][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1938.804589][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1938.818435][ T7808] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1938.836684][ T7808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1938.849161][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1938.883111][ T7808] 8021q: adding VLAN 0 to HW filter on device batadv0 01:43:55 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:55 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 01:43:55 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:43:55 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="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") 01:43:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="c00e00002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="e03f03002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:43:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:43:55 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") socket(0xb, 0x80000, 0x100000001) 01:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:43:55 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1943.434676][ T7] device bridge_slave_1 left promiscuous mode [ 1943.440926][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1943.494835][ T7] device bridge_slave_0 left promiscuous mode [ 1943.501033][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1945.136839][ T7] device hsr_slave_1 left promiscuous mode [ 1945.206944][ T7] device hsr_slave_0 left promiscuous mode [ 1945.259328][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1945.270923][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1945.282378][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1945.340405][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1945.420873][ T7] bond0 (unregistering): Released all slaves [ 1945.541846][ T8340] IPVS: ftp: loaded support on port[0] = 21 [ 1945.623058][ T8340] chnl_net:caif_netlink_parms(): no params data found [ 1945.663310][ T8340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1945.671521][ T8340] bridge0: port 1(bridge_slave_0) entered disabled state [ 1945.679699][ T8340] device bridge_slave_0 entered promiscuous mode [ 1945.687863][ T8340] bridge0: port 2(bridge_slave_1) entered blocking state [ 1945.695076][ T8340] bridge0: port 2(bridge_slave_1) entered disabled state [ 1945.702731][ T8340] device bridge_slave_1 entered promiscuous mode [ 1945.722384][ T8340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1945.733010][ T8340] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1945.802533][ T8340] team0: Port device team_slave_0 added [ 1945.815285][ T8340] team0: Port device team_slave_1 added [ 1945.877433][ T8340] device hsr_slave_0 entered promiscuous mode [ 1946.034079][ T8340] device hsr_slave_1 entered promiscuous mode [ 1946.121815][ T8340] bridge0: port 2(bridge_slave_1) entered blocking state [ 1946.128977][ T8340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1946.136449][ T8340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1946.143613][ T8340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1946.210228][ T8340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1946.231272][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1946.247645][T14088] bridge0: port 1(bridge_slave_0) entered disabled state [ 1946.261597][T14088] bridge0: port 2(bridge_slave_1) entered disabled state [ 1946.282578][ T8340] 8021q: adding VLAN 0 to HW filter on device team0 [ 1946.301744][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1946.313161][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 1946.320347][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1946.351746][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1946.361864][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1946.369036][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1946.402257][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1946.411866][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1946.427299][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1946.449369][ T8340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1946.467860][ T8340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1946.477266][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1946.486533][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1946.508616][ T8340] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:03 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0002004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="ae0100202500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:03 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x6, 0x2) pwritev(r2, &(0x7f00000003c0)=[{&(0x7f0000000100)="c1e38e80f62d61649cb4f2a6aff4f70ad7ae7872dd50548a41fcb49a874afe9ef56aa4727f84d6e40249d43918ae5f4f22a5474a3bc2b2da788991c18a24a1bcf7aa50a5fd7a2ab12fbf4f3bc944abf12944e6cab1fd87c89355d3", 0x5b}, {&(0x7f00000002c0)="fe522d0609ade46f3da18eb0c0e04b5b6398d2405e3c72dab49ddfeb95713220b90ffe5fd1658009a3cf51286a1322c2756699267d316369dc94f526c5e7d98d7e1474ebb6f668469dfc342e2d0c71c4a2664685fe31246432bee523ae7840fdb6494209689d48981201a458998baea6f3aef74d32ce2d52f5b7374b44b7e74929c88745c8bc347d50a6ae54791b7fac5eb7dff5c193ac967a6f09be110b551627ef3bd41f0d51bd388edb1f723285b46b450ea54102f92f7ed20b52210de14a540e61c9c8a8522e42df54c8c21af0182c34", 0xd2}], 0x2, 0x0) 01:44:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:03 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$sock_ifreq(r0, 0x8938, &(0x7f0000000080)={'eql\x00', @ifru_names='eql\x00'}) 01:44:03 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:03 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001100)=ANY=[@ANYBLOB="a6000000290100000000000101000000040000004000000000000000000000000807002e2f66696c6530c40000000003000000000000000000000000000000ff07002e2f66696c65304001000000070000000000000080000000000000000007002e2f66696c"], 0x66) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000000100), 0x8000261, 0x24000004) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:03 executing program 0: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'team_slave_1\x00', 0x400}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") r1 = shmget(0x2, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) 01:44:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="00f0ff7f2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:03 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x0, @bt={0x9, 0x7, 0x1, 0x3, 0xffffffffffffffe6, 0x6, 0xfffffffffffffffc, 0x80000000, 0x2, 0x9, 0x1, 0x5, 0xff, 0xffffffffffff8001, 0xd, 0x1}}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) [ 1951.354238][ T7] device bridge_slave_1 left promiscuous mode [ 1951.360431][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1951.434453][ T7] device bridge_slave_0 left promiscuous mode [ 1951.440675][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1953.126808][ T7] device hsr_slave_1 left promiscuous mode [ 1953.197117][ T7] device hsr_slave_0 left promiscuous mode [ 1953.248890][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1953.260384][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1953.272200][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1953.311029][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1953.401792][ T7] bond0 (unregistering): Released all slaves [ 1953.529627][ T8935] IPVS: ftp: loaded support on port[0] = 21 [ 1953.591882][ T8935] chnl_net:caif_netlink_parms(): no params data found [ 1953.638569][ T8935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1953.645885][ T8935] bridge0: port 1(bridge_slave_0) entered disabled state [ 1953.653948][ T8935] device bridge_slave_0 entered promiscuous mode [ 1953.662087][ T8935] bridge0: port 2(bridge_slave_1) entered blocking state [ 1953.669313][ T8935] bridge0: port 2(bridge_slave_1) entered disabled state [ 1953.677336][ T8935] device bridge_slave_1 entered promiscuous mode [ 1953.697849][ T8935] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1953.707861][ T8935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1953.728183][ T8935] team0: Port device team_slave_0 added [ 1953.736292][ T8935] team0: Port device team_slave_1 added [ 1953.785459][ T8935] device hsr_slave_0 entered promiscuous mode [ 1953.823908][ T8935] device hsr_slave_1 entered promiscuous mode [ 1953.873032][ T8935] bridge0: port 2(bridge_slave_1) entered blocking state [ 1953.880161][ T8935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1953.887554][ T8935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1953.894693][ T8935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1953.926531][ T8935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1953.991993][ T8935] 8021q: adding VLAN 0 to HW filter on device team0 [ 1953.999399][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1954.007949][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1954.015994][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 1954.035500][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1954.044489][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 1954.051569][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1954.059316][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1954.068047][ T4308] bridge0: port 2(bridge_slave_1) entered blocking state [ 1954.075182][ T4308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1954.096423][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1954.105705][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1954.116240][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1954.129506][ T8935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1954.141831][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1954.156199][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1954.169045][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1954.192909][ T8935] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:11 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:11 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="effdffff2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:11 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000340)={'mangle\x00'}, &(0x7f00000003c0)=0x54) ioctl(r0, 0x1000008912, &(0x7f0000000600)="0adc1f123c123f319bd070b09cdb1f3b9267a073715dc4127e66f7fade2bb8b87c2890d36f53fe2ff2498d03f943467af3aff44295e9d6f18013e8150e375d235c0bad7077ca85059a45144e14a05690a714ab576a23c3bea8ea35fe60b0694a071e0c1bdeb8f980ab8016458ef333cbf1adf91881a8a686892e4f9e81479a44055901458cd3d3c23f63528ddb2592072edd3d50e5117914d9eddff738f3c91e250627c992fdb40a34ea67dc47c934c2ec825bceac503c79c57bca3bbd3748d09757a44a6ba0b6") syz_execute_func(&(0x7f0000000400)="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") r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48041}, 0x10) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x3ff, 0x4) 01:44:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:11 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0xffffffffffff8001, 0x5, 0xd0}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x7, 0x4) 01:44:11 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="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") fallocate(r0, 0x0, 0x3, 0x1) 01:44:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:11 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000000500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:11 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') syz_execute_func(&(0x7f0000000a80)="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") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000000000000100000000000003500000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000004000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000a2e64b07052d26b07d3da15ce9625318b72d7b668098493e5be28077c8fbc4369118e1dadbf0bf72a8a1a15a3327ff3753e1cfdca71d24"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = getgid() ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000400)) write$P9_RSTATu(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="710000007d020000004a00c40305000000030000000001000000000000000000000808000000ff0700008a430000000000000c0070707030707070316574683001002900000a00776c616e30707070302812002f6465762f736e642f70636d432344237000be69a7a9f7f49b29f0f48463e688cef960e5bdb7c60b12770812", @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r3], 0x71) [ 1959.305356][ T2993] device bridge_slave_1 left promiscuous mode [ 1959.311571][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1959.364768][ T2993] device bridge_slave_0 left promiscuous mode [ 1959.379158][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1961.046702][ T2993] device hsr_slave_1 left promiscuous mode [ 1961.089187][ T2993] device hsr_slave_0 left promiscuous mode [ 1961.157184][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1961.171783][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1961.183130][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1961.247614][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1961.317879][ T2993] bond0 (unregistering): Released all slaves [ 1961.442788][ T9488] IPVS: ftp: loaded support on port[0] = 21 [ 1961.504946][ T9488] chnl_net:caif_netlink_parms(): no params data found [ 1961.542372][ T9488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1961.549789][ T9488] bridge0: port 1(bridge_slave_0) entered disabled state [ 1961.557715][ T9488] device bridge_slave_0 entered promiscuous mode [ 1961.566492][ T9488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1961.573802][ T9488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1961.581779][ T9488] device bridge_slave_1 entered promiscuous mode [ 1961.602207][ T9488] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1961.612989][ T9488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1961.632395][ T9488] team0: Port device team_slave_0 added [ 1961.640094][ T9488] team0: Port device team_slave_1 added [ 1961.695776][ T9488] device hsr_slave_0 entered promiscuous mode [ 1961.734027][ T9488] device hsr_slave_1 entered promiscuous mode [ 1961.852953][ T9488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1961.860142][ T9488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1961.867693][ T9488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1961.874831][ T9488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1961.949646][ T9488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1961.974223][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1961.983108][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1961.997586][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1962.015414][ T9488] 8021q: adding VLAN 0 to HW filter on device team0 [ 1962.028736][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1962.038200][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1962.045339][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1962.064744][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1962.073306][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1962.080465][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1962.105219][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1962.114952][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1962.124180][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1962.132805][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1962.144809][ T9488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1962.154321][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1962.175191][ T9488] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:18 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000000f00e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:18 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000200)) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000002c0)={0xa, 0x6, 0x80000001, 0x4}, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000300), 0x4) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="5fcbfd2f4b49f73b8e575b9cfc2652ec43da1efe06ce165150b98ee7760001b65c456bb6917a0ba952cd677c494f81ffe8f6088c0455c14bf46294510ad5d05e2d254c92256202e1bec6197e62d11a2f70a322dfaa1ba5e108ccb4bfb3c875d01d3ccf51920193fd569a772072", 0x6d}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000100)="f7d2cc90abe5c2ae51d34678e45db5a1688c22b9adffdafd67e685a062b2be991d08a6ff7a46c0695615efc8447b396e2212b7cd71da4a35511ad1418a1223a9d0a4d9afdda9d9ff", 0x48}, {&(0x7f0000000180)="200e04c36e3429a6cb8bc1a371b25a9fa84f6916b56cc5a2e85d9c87ede5811576dac3bd714068e9224b7e2a03c02513112cd4ec88f22d462d0153746ee746f52a60dd6098", 0x45}, {&(0x7f0000000200)}], 0x5, 0x2) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="6b14e3643c323f319bd070") syz_execute_func(&(0x7f0000000400)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000006b0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421fd045f46070721dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50005f7cece660f79ca553131c4e3b168de00fbfb3b62") 01:44:18 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)={0x1, 0x400}) 01:44:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0200002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:18 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="984a2ae9964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab18440ff97f7ff3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2643bc2c442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:19 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0400002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319b") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) [ 1966.844607][ T2993] device bridge_slave_1 left promiscuous mode [ 1966.850873][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1966.904844][ T2993] device bridge_slave_0 left promiscuous mode [ 1966.911118][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1968.610261][ T2993] device hsr_slave_1 left promiscuous mode [ 1968.669055][ T2993] device hsr_slave_0 left promiscuous mode [ 1968.728649][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1968.740249][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1968.752341][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1968.797702][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1968.890579][ T2993] bond0 (unregistering): Released all slaves [ 1968.991832][ T9912] IPVS: ftp: loaded support on port[0] = 21 [ 1969.055145][ T9912] chnl_net:caif_netlink_parms(): no params data found [ 1969.092514][ T9912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1969.102690][ T9912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1969.112046][ T9912] device bridge_slave_0 entered promiscuous mode [ 1969.120949][ T9912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1969.128271][ T9912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1969.136260][ T9912] device bridge_slave_1 entered promiscuous mode [ 1969.156534][ T9912] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1969.167687][ T9912] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1969.185702][ T9912] team0: Port device team_slave_0 added [ 1969.225171][ T9912] team0: Port device team_slave_1 added [ 1969.282171][ T9912] device hsr_slave_0 entered promiscuous mode [ 1969.343984][ T9912] device hsr_slave_1 entered promiscuous mode [ 1969.431092][ T9912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1969.438273][ T9912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1969.445725][ T9912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1969.452822][ T9912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1969.528933][ T9912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1969.551783][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1969.562970][ T3976] bridge0: port 1(bridge_slave_0) entered disabled state [ 1969.578215][ T3976] bridge0: port 2(bridge_slave_1) entered disabled state [ 1969.595678][ T9912] 8021q: adding VLAN 0 to HW filter on device team0 [ 1969.608300][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1969.617602][ T3976] bridge0: port 1(bridge_slave_0) entered blocking state [ 1969.624759][ T3976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1969.651244][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1969.660396][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1969.667550][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1969.702127][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1969.713286][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1969.722597][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1969.732084][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1969.751441][ T9912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1969.762909][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1969.800991][ T9912] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:26 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x6) r1 = dup2(r0, r0) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) 01:44:26 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0a00002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319b") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:26 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319b") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0e00002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8eb, 0x8, 0x0}, 0x2c) 01:44:26 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="fe5fc7d4d83134672f005d9e28fbd69d0322e6062ea14db63b8369d58350395c5aabc620eda0f33cb9a57005dc800fccbce56e681db46247c0887ef225ed9216d4934ddae14dd758f71280b6c3db55334787a04ed1057f0ef47d0d51f21c2da4625d749a0e4bd3e97f4cda32ce9d7577750847bfe297cf254e5d24c9ea3db1bc48baa65d965af5a0094e34b6a7646051f944efcebca2cd6ca51f09d4a8fe9ac61d50583a8779d3922a21c53920696f3201650b6f30bfcfefaf4ae3f7ef80c352b9a043199728b1dda50345c187b389e3bc92d6407d25a2ca72fa5b4d091092d5a38c7be2a728943ad890f13aeb16c08efeb2e31876b9") ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000340)={0x14, 0x47, &(0x7f00000002c0)="e43f4c2be57bb2fdf0c9daa8516ab7b38229b114143626bf2ab0c09e7bedf79e61d9eaa55e71728237fb7c1104b929447777bfaa93492de5a9603dc860434b30f1b3cf4798e311"}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) [ 1974.594602][ T6832] device bridge_slave_1 left promiscuous mode [ 1974.601129][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1974.685065][ T6832] device bridge_slave_0 left promiscuous mode [ 1974.691398][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1976.375958][ T6832] device hsr_slave_1 left promiscuous mode [ 1976.429205][ T6832] device hsr_slave_0 left promiscuous mode [ 1976.496994][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 1976.512217][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 1976.523941][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1976.580281][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1976.679782][ T6832] bond0 (unregistering): Released all slaves [ 1976.792060][T10476] IPVS: ftp: loaded support on port[0] = 21 [ 1976.852855][T10476] chnl_net:caif_netlink_parms(): no params data found [ 1976.883812][T10476] bridge0: port 1(bridge_slave_0) entered blocking state [ 1976.891024][T10476] bridge0: port 1(bridge_slave_0) entered disabled state [ 1976.899341][T10476] device bridge_slave_0 entered promiscuous mode [ 1976.909295][T10476] bridge0: port 2(bridge_slave_1) entered blocking state [ 1976.916570][T10476] bridge0: port 2(bridge_slave_1) entered disabled state [ 1976.924778][T10476] device bridge_slave_1 entered promiscuous mode [ 1976.943250][T10476] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1976.953144][T10476] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1976.971851][T10476] team0: Port device team_slave_0 added [ 1976.979328][T10476] team0: Port device team_slave_1 added [ 1977.025989][T10476] device hsr_slave_0 entered promiscuous mode [ 1977.076816][T10476] device hsr_slave_1 entered promiscuous mode [ 1977.182705][T10476] bridge0: port 2(bridge_slave_1) entered blocking state [ 1977.189849][T10476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1977.197533][T10476] bridge0: port 1(bridge_slave_0) entered blocking state [ 1977.204752][T10476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1977.240211][T10476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1977.255439][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1977.265109][T14088] bridge0: port 1(bridge_slave_0) entered disabled state [ 1977.273054][T14088] bridge0: port 2(bridge_slave_1) entered disabled state [ 1977.288895][T10476] 8021q: adding VLAN 0 to HW filter on device team0 [ 1977.301047][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1977.310358][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 1977.317517][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1977.345351][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1977.355249][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1977.362343][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1977.376921][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1977.389307][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1977.408949][T10476] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1977.421231][T10476] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1977.434030][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1977.442042][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1977.451255][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1977.470595][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1977.481730][T10476] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:34 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:34 executing program 0: r0 = creat(0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) 01:44:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0f00002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:34 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101, &(0x7f00000000c0)="0adc1f123c123f319bd072") syz_execute_func(&(0x7f0000000e00)="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") ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x3f) 01:44:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 01:44:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8eb, 0x2, 0x0}, 0x2c) 01:44:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e6000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:34 executing program 1: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x0, &(0x7f0000ff2000/0xe000)=nil) [ 1982.084413][ T6832] device bridge_slave_1 left promiscuous mode [ 1982.090655][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1982.154451][ T6832] device bridge_slave_0 left promiscuous mode [ 1982.160686][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1983.836605][ T6832] device hsr_slave_1 left promiscuous mode [ 1983.877827][ T6832] device hsr_slave_0 left promiscuous mode [ 1983.956665][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 1983.968497][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 1983.981201][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1984.038179][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1984.129842][ T6832] bond0 (unregistering): Released all slaves [ 1984.249692][T10911] IPVS: ftp: loaded support on port[0] = 21 [ 1984.312703][T10911] chnl_net:caif_netlink_parms(): no params data found [ 1984.345943][T10911] bridge0: port 1(bridge_slave_0) entered blocking state [ 1984.353156][T10911] bridge0: port 1(bridge_slave_0) entered disabled state [ 1984.361052][T10911] device bridge_slave_0 entered promiscuous mode [ 1984.369137][T10911] bridge0: port 2(bridge_slave_1) entered blocking state [ 1984.376369][T10911] bridge0: port 2(bridge_slave_1) entered disabled state [ 1984.384492][T10911] device bridge_slave_1 entered promiscuous mode [ 1984.404959][T10911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1984.415324][T10911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1984.435460][T10911] team0: Port device team_slave_0 added [ 1984.442264][T10911] team0: Port device team_slave_1 added [ 1984.515350][T10911] device hsr_slave_0 entered promiscuous mode [ 1984.554068][T10911] device hsr_slave_1 entered promiscuous mode [ 1984.672678][T10911] bridge0: port 2(bridge_slave_1) entered blocking state [ 1984.679800][T10911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1984.687222][T10911] bridge0: port 1(bridge_slave_0) entered blocking state [ 1984.694340][T10911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1984.731571][T10911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1984.744543][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1984.752763][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1984.762747][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1984.783090][T10911] 8021q: adding VLAN 0 to HW filter on device team0 [ 1984.801928][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1984.811145][ T4088] bridge0: port 1(bridge_slave_0) entered blocking state [ 1984.818517][ T4088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1984.851524][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1984.860764][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 1984.867927][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1984.902419][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1984.912193][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1984.931086][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1984.943024][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1984.959981][T10911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1984.971865][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1985.008783][T10911] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:41 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:41 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x2d, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0063404000000000000000000000000000000000000000d52e8df6378788d50d87a63ac05af96933fab3f8c34d"], 0x0, 0x0, 0x0}) 01:44:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2ef000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:41 executing program 4: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x9, @rand_addr="406cd9624a2433b5ab50c1a225bfce4e", 0x5d}, @in6={0xa, 0x4e21, 0x5e2d, @remote}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x8000}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x632d5c2a}], 0x80) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x0, &(0x7f0000ff2000/0xe000)=nil) 01:44:41 executing program 1: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1986.972287][ T26] audit: type=1400 audit(1556761481.911:167): avc: denied { set_context_mgr } for pid=11155 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 1986.982855][T11162] binder_alloc: 11155: binder_alloc_buf, no vma 01:44:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x0, &(0x7f0000ff2000/0xe000)=nil) [ 1987.024709][ T26] audit: type=1400 audit(1556761481.911:168): avc: denied { call } for pid=11155 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 1987.044616][T11162] binder: 11155:11162 transaction failed 29189/-3, size -4325509554903582374-77 line 3148 01:44:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000a002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:42 executing program 1: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 1987.116597][T14083] binder: undelivered TRANSACTION_ERROR: 29189 [ 1987.132391][T11173] binder_alloc: 11155: binder_alloc_buf, no vma [ 1987.228454][T11173] binder: 11155:11173 transaction failed 29189/-3, size -4325509554903582374-77 line 3148 01:44:42 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000e002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:42 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") [ 1987.333967][T14083] binder: undelivered TRANSACTION_ERROR: 29189 [ 1989.954548][ T7] device bridge_slave_1 left promiscuous mode [ 1989.960762][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1990.024742][ T7] device bridge_slave_0 left promiscuous mode [ 1990.030944][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1991.716669][ T7] device hsr_slave_1 left promiscuous mode [ 1991.759282][ T7] device hsr_slave_0 left promiscuous mode [ 1991.819326][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1991.830867][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1991.843019][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1991.907712][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1991.998778][ T7] bond0 (unregistering): Released all slaves [ 1992.132671][T11468] IPVS: ftp: loaded support on port[0] = 21 [ 1992.205959][T11468] chnl_net:caif_netlink_parms(): no params data found [ 1992.238646][T11468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1992.246025][T11468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1992.253944][T11468] device bridge_slave_0 entered promiscuous mode [ 1992.261883][T11468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1992.269153][T11468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1992.277025][T11468] device bridge_slave_1 entered promiscuous mode [ 1992.296840][T11468] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1992.306961][T11468] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1992.327636][T11468] team0: Port device team_slave_0 added [ 1992.335075][T11468] team0: Port device team_slave_1 added [ 1992.386505][T11468] device hsr_slave_0 entered promiscuous mode [ 1992.453912][T11468] device hsr_slave_1 entered promiscuous mode [ 1992.513373][T11468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1992.520556][T11468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1992.527972][T11468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1992.535127][T11468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1992.571942][T11468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1992.612489][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1992.620649][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1992.628943][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 1992.640706][T11468] 8021q: adding VLAN 0 to HW filter on device team0 [ 1992.658453][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1992.671732][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1992.678948][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1992.705562][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1992.715226][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1992.722319][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1992.731721][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1992.740894][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1992.758004][T11468] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1992.768951][T11468] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1992.781724][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1992.793097][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1992.802338][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1992.823293][T11468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1992.832322][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:44:49 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0000024a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:49 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x1, &(0x7f0000000240), 0x0, 0x0) 01:44:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2ec00e002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:49 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000007c0)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000002a2a0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f65f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab03dbe266f3adc462b1f72ec3c489309294d8d800000000aa63634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca558f49489b18c4e3b168de00fbfb3b62") 01:44:49 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:49 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x9, @rand_addr="406cd9624a2433b5ab50c1a225bfce4e", 0x5d}, @in6={0xa, 0x4e21, 0x5e2d, @remote}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x8000}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x632d5c2a}], 0x80) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:44:49 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000f002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:49 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:49 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x9, @rand_addr="406cd9624a2433b5ab50c1a225bfce4e", 0x5d}, @in6={0xa, 0x4e21, 0x5e2d, @remote}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x8000}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x632d5c2a}], 0x80) syz_execute_func(&(0x7f0000000180)="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") 01:44:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2ef623002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e003f002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 1997.404504][ T2993] device bridge_slave_1 left promiscuous mode [ 1997.410781][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1997.454447][ T2993] device bridge_slave_0 left promiscuous mode [ 1997.460674][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1999.155914][ T2993] device hsr_slave_1 left promiscuous mode [ 1999.217584][ T2993] device hsr_slave_0 left promiscuous mode [ 1999.277313][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 1999.290755][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 1999.302068][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1999.349803][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1999.440137][ T2993] bond0 (unregistering): Released all slaves [ 1999.559754][T11866] IPVS: ftp: loaded support on port[0] = 21 [ 1999.621771][T11866] chnl_net:caif_netlink_parms(): no params data found [ 1999.663827][T11866] bridge0: port 1(bridge_slave_0) entered blocking state [ 1999.671006][T11866] bridge0: port 1(bridge_slave_0) entered disabled state [ 1999.679099][T11866] device bridge_slave_0 entered promiscuous mode [ 1999.687234][T11866] bridge0: port 2(bridge_slave_1) entered blocking state [ 1999.687316][T11866] bridge0: port 2(bridge_slave_1) entered disabled state [ 1999.702411][T11866] device bridge_slave_1 entered promiscuous mode [ 1999.721002][T11866] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1999.732666][T11866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1999.757749][T11866] team0: Port device team_slave_0 added [ 1999.769661][T11866] team0: Port device team_slave_1 added [ 1999.815363][T11866] device hsr_slave_0 entered promiscuous mode [ 1999.874163][T11866] device hsr_slave_1 entered promiscuous mode [ 1999.981208][T11866] bridge0: port 2(bridge_slave_1) entered blocking state [ 1999.988361][T11866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1999.995787][T11866] bridge0: port 1(bridge_slave_0) entered blocking state [ 2000.002849][T11866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2000.070823][T11866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2000.092278][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2000.101587][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 2000.116723][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 2000.140136][T11866] 8021q: adding VLAN 0 to HW filter on device team0 [ 2000.152612][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2000.162298][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 2000.169456][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2000.187580][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2000.196177][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2000.204552][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2000.229591][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2000.238952][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2000.248052][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2000.261318][T11866] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2000.273809][T11866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2000.282032][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2000.291243][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2000.311993][T11866] 8021q: adding VLAN 0 to HW filter on device batadv0 01:44:57 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0060002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:57 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$capi20_data(r0, &(0x7f00000002c0)={{0x10, 0x6, 0x41, 0x82, 0x6, 0x1}, 0x1000, "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"}, 0x1012) bind$rds(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x9, @rand_addr="406cd9624a2433b5ab50c1a225bfce4e", 0x5d}, @in6={0xa, 0x4e21, 0x5e2d, @remote}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x8000}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x632d5c2a}], 0x80) syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x3, 0x4) accept$nfc_llcp(r0, &(0x7f0000000080), &(0x7f0000000100)=0x60) 01:44:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0ec0002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:57 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00f0002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:44:57 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:44:57 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 2005.124435][T11867] device bridge_slave_1 left promiscuous mode [ 2005.130724][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2005.184699][T11867] device bridge_slave_0 left promiscuous mode [ 2005.190901][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2006.856657][T11867] device hsr_slave_1 left promiscuous mode [ 2006.916951][T11867] device hsr_slave_0 left promiscuous mode [ 2006.969304][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2006.981432][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2006.992900][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2007.057757][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2007.162022][T11867] bond0 (unregistering): Released all slaves [ 2007.281993][T12511] IPVS: ftp: loaded support on port[0] = 21 [ 2007.342950][T12511] chnl_net:caif_netlink_parms(): no params data found [ 2007.376786][T12511] bridge0: port 1(bridge_slave_0) entered blocking state [ 2007.384049][T12511] bridge0: port 1(bridge_slave_0) entered disabled state [ 2007.391738][T12511] device bridge_slave_0 entered promiscuous mode [ 2007.399753][T12511] bridge0: port 2(bridge_slave_1) entered blocking state [ 2007.406974][T12511] bridge0: port 2(bridge_slave_1) entered disabled state [ 2007.415071][T12511] device bridge_slave_1 entered promiscuous mode [ 2007.435255][T12511] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2007.445603][T12511] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2007.466553][T12511] team0: Port device team_slave_0 added [ 2007.474148][T12511] team0: Port device team_slave_1 added [ 2007.555473][T12511] device hsr_slave_0 entered promiscuous mode [ 2007.604034][T12511] device hsr_slave_1 entered promiscuous mode [ 2007.716078][T12511] bridge0: port 2(bridge_slave_1) entered blocking state [ 2007.723267][T12511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2007.730772][T12511] bridge0: port 1(bridge_slave_0) entered blocking state [ 2007.738072][T12511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2007.776780][T12511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2007.791893][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2007.800662][ T3972] bridge0: port 1(bridge_slave_0) entered disabled state [ 2007.809661][ T3972] bridge0: port 2(bridge_slave_1) entered disabled state [ 2007.832327][T12511] 8021q: adding VLAN 0 to HW filter on device team0 [ 2007.850317][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2007.859676][ T3972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2007.866924][ T3972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2007.888235][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2007.897830][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2007.904990][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2007.934914][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2007.944467][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2007.953178][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2007.962063][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2007.973207][T12511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2007.983449][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2008.012022][T12511] 8021q: adding VLAN 0 to HW filter on device batadv0 01:45:05 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e23f6002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:05 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0, 0x7fff, 0x3335, 0x2}, {0x50000000, 0x80, 0x0, 0x10000}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl(r0, 0x1000008919, &(0x7f0000000140)="0adc1f12031220cd3f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000003f00e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:05 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syncfs(r1) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) ioctl(r1, 0x6, &(0x7f00000002c0)="0adc1f123c123f319bd070") ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000140)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000080)={0xa, 0x2, 0x100000000, 0x5, 'syz1\x00', 0xffffffff}) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:05 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0002002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:05 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 01:45:05 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x1000000) syz_execute_func(&(0x7f0000000180)="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") [ 2012.864478][ T7] device bridge_slave_1 left promiscuous mode [ 2012.870963][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2012.934434][ T7] device bridge_slave_0 left promiscuous mode [ 2012.940660][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2014.706855][ T7] device hsr_slave_1 left promiscuous mode [ 2014.770901][ T7] device hsr_slave_0 left promiscuous mode [ 2014.837888][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2014.849942][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2014.865648][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2014.899481][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2014.983217][ T7] bond0 (unregistering): Released all slaves [ 2015.092454][T13070] IPVS: ftp: loaded support on port[0] = 21 [ 2015.168999][T13070] chnl_net:caif_netlink_parms(): no params data found [ 2015.205507][T13070] bridge0: port 1(bridge_slave_0) entered blocking state [ 2015.217308][T13070] bridge0: port 1(bridge_slave_0) entered disabled state [ 2015.229151][T13070] device bridge_slave_0 entered promiscuous mode [ 2015.240432][T13070] bridge0: port 2(bridge_slave_1) entered blocking state [ 2015.250676][T13070] bridge0: port 2(bridge_slave_1) entered disabled state [ 2015.260569][T13070] device bridge_slave_1 entered promiscuous mode [ 2015.282227][T13070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2015.339447][T13070] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2015.364867][T13070] team0: Port device team_slave_0 added [ 2015.373926][T13070] team0: Port device team_slave_1 added [ 2015.426603][T13070] device hsr_slave_0 entered promiscuous mode [ 2015.505510][T13070] device hsr_slave_1 entered promiscuous mode [ 2015.569806][T13070] bridge0: port 2(bridge_slave_1) entered blocking state [ 2015.577871][T13070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2015.586037][T13070] bridge0: port 1(bridge_slave_0) entered blocking state [ 2015.594218][T13070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2015.660197][T13070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2015.682732][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2015.699937][T14083] bridge0: port 1(bridge_slave_0) entered disabled state [ 2015.711683][T14083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2015.737144][T13070] 8021q: adding VLAN 0 to HW filter on device team0 [ 2015.761295][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2015.780159][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 2015.788475][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2015.815959][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2015.826166][ T4308] bridge0: port 2(bridge_slave_1) entered blocking state [ 2015.834258][ T4308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2015.861052][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2015.872800][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2015.887964][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2015.902631][T13070] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2015.915878][T13070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2015.925310][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2015.935720][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2015.969891][T13070] 8021q: adding VLAN 0 to HW filter on device batadv0 01:45:12 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0004002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:12 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 01:45:12 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup2(r1, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x10000, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="100027bd7000fcdbdf25010000000000000008410000004c001878180dd462726f6164636173742d6c696e6b00"/98], 0x68}}, 0x14) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:12 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000100)=@req={0xfffffffffffffff9, 0x100000000, 0x0, 0x101}, 0x10) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000a002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:12 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 01:45:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc0000000094c08a6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x53) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:12 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000e002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:13 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") [ 2018.105024][T13451] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 01:45:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000f002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2018.105036][T13451] loop4: partition table partially beyond EOD, [ 2018.484071][T13451] truncated [ 2018.494449][T13451] loop4: p1 size 2 extends beyond EOD, truncated [ 2018.514247][T13451] loop4: p4 start 1854537728 is beyond EOD, truncated [ 2018.521763][T13451] loop4: p5 start 1854537728 is beyond EOD, truncated [ 2018.540784][T13451] loop4: p6 start 1854537728 is beyond EOD, truncated [ 2018.553643][T13451] loop4: p7 start 1854537728 is beyond EOD, truncated [ 2018.561172][T13451] loop4: p8 start 1854537728 is beyond EOD, truncated [ 2018.583683][T13451] loop4: p9 start 1854537728 is beyond EOD, truncated [ 2018.591459][T13451] loop4: p10 start 1854537728 is beyond EOD, truncated [ 2018.600978][T13451] loop4: p11 start 1854537728 is beyond EOD, truncated [ 2018.624141][T13451] loop4: p12 start 1854537728 is beyond EOD, truncated [ 2018.632020][T13451] loop4: p13 start 1854537728 is beyond EOD, truncated [ 2018.640035][T13451] loop4: p14 start 1854537728 is beyond EOD, truncated [ 2018.648751][T13451] loop4: p15 start 1854537728 is beyond EOD, truncated [ 2018.664277][T13451] loop4: p16 start 1854537728 is beyond EOD, truncated [ 2018.672000][T13451] loop4: p17 start 1854537728 is beyond EOD, truncated [ 2018.684140][T13451] loop4: p18 start 1854537728 is beyond EOD, truncated [ 2018.691319][T13451] loop4: p19 start 1854537728 is beyond EOD, truncated [ 2018.702846][T13451] loop4: p20 start 1854537728 is beyond EOD, truncated [ 2018.710571][T13451] loop4: p21 start 1854537728 is beyond EOD, truncated [ 2018.722038][T13451] loop4: p22 start 1854537728 is beyond EOD, truncated [ 2018.730342][T13451] loop4: p23 start 1854537728 is beyond EOD, truncated [ 2018.738719][T13451] loop4: p24 start 1854537728 is beyond EOD, truncated [ 2018.753689][T13451] loop4: p25 start 1854537728 is beyond EOD, truncated [ 2018.761666][T13451] loop4: p26 start 1854537728 is beyond EOD, truncated [ 2018.773797][T13451] loop4: p27 start 1854537728 is beyond EOD, truncated [ 2018.780879][T13451] loop4: p28 start 1854537728 is beyond EOD, truncated [ 2018.793964][T13451] loop4: p29 start 1854537728 is beyond EOD, truncated [ 2018.801500][T13451] loop4: p30 start 1854537728 is beyond EOD, truncated [ 2018.809219][T13451] loop4: p31 start 1854537728 is beyond EOD, truncated [ 2018.820451][T13451] loop4: p32 start 1854537728 is beyond EOD, truncated [ 2018.831499][T13451] loop4: p33 start 1854537728 is beyond EOD, truncated [ 2018.839126][T13451] loop4: p34 start 1854537728 is beyond EOD, truncated [ 2018.846514][T13451] loop4: p35 start 1854537728 is beyond EOD, truncated [ 2018.857259][T13451] loop4: p36 start 1854537728 is beyond EOD, truncated [ 2018.870164][T13451] loop4: p37 start 1854537728 is beyond EOD, truncated [ 2018.883665][T13451] loop4: p38 start 1854537728 is beyond EOD, truncated [ 2018.891809][T13451] loop4: p39 start 1854537728 is beyond EOD, truncated [ 2018.904212][T13451] loop4: p40 start 1854537728 is beyond EOD, truncated [ 2018.911869][T13451] loop4: p41 start 1854537728 is beyond EOD, truncated [ 2018.924057][T13451] loop4: p42 start 1854537728 is beyond EOD, truncated [ 2018.931113][T13451] loop4: p43 start 1854537728 is beyond EOD, truncated [ 2018.943466][T13451] loop4: p44 start 1854537728 is beyond EOD, truncated [ 2018.953622][T13451] loop4: p45 start 1854537728 is beyond EOD, truncated [ 2018.960701][T13451] loop4: p46 start 1854537728 is beyond EOD, truncated [ 2018.974214][T13451] loop4: p47 start 1854537728 is beyond EOD, truncated [ 2018.981780][T13451] loop4: p48 start 1854537728 is beyond EOD, truncated [ 2018.998943][T13451] loop4: p49 start 1854537728 is beyond EOD, truncated [ 2019.006589][T13451] loop4: p50 start 1854537728 is beyond EOD, truncated [ 2019.015782][T13451] loop4: p51 start 1854537728 is beyond EOD, truncated [ 2019.022888][T13451] loop4: p52 start 1854537728 is beyond EOD, truncated [ 2019.042274][T13451] loop4: p53 start 1854537728 is beyond EOD, truncated [ 2019.049982][T13451] loop4: p54 start 1854537728 is beyond EOD, truncated [ 2019.057559][T13451] loop4: p55 start 1854537728 is beyond EOD, truncated [ 2019.065095][T13451] loop4: p56 start 1854537728 is beyond EOD, truncated [ 2019.072155][T13451] loop4: p57 start 1854537728 is beyond EOD, truncated [ 2019.094084][T13451] loop4: p58 start 1854537728 is beyond EOD, truncated [ 2019.100978][T13451] loop4: p59 start 1854537728 is beyond EOD, truncated [ 2019.108358][T13451] loop4: p60 start 1854537728 is beyond EOD, truncated [ 2019.116700][T13451] loop4: p61 start 1854537728 is beyond EOD, truncated [ 2019.133935][T13451] loop4: p62 start 1854537728 is beyond EOD, truncated [ 2019.140829][T13451] loop4: p63 start 1854537728 is beyond EOD, truncated [ 2019.148150][T13451] loop4: p64 start 1854537728 is beyond EOD, truncated [ 2019.164106][T13451] loop4: p65 start 1854537728 is beyond EOD, truncated [ 2019.170996][T13451] loop4: p66 start 1854537728 is beyond EOD, truncated [ 2019.178606][T13451] loop4: p67 start 1854537728 is beyond EOD, truncated [ 2019.185958][T13451] loop4: p68 start 1854537728 is beyond EOD, truncated [ 2019.192832][T13451] loop4: p69 start 1854537728 is beyond EOD, truncated [ 2019.213825][T13451] loop4: p70 start 1854537728 is beyond EOD, truncated [ 2019.220890][T13451] loop4: p71 start 1854537728 is beyond EOD, truncated [ 2019.228276][T13451] loop4: p72 start 1854537728 is beyond EOD, truncated [ 2019.236138][T13451] loop4: p73 start 1854537728 is beyond EOD, truncated [ 2019.243007][T13451] loop4: p74 start 1854537728 is beyond EOD, truncated [ 2019.263974][T13451] loop4: p75 start 1854537728 is beyond EOD, truncated [ 2019.270871][T13451] loop4: p76 start 1854537728 is beyond EOD, truncated [ 2019.278247][T13451] loop4: p77 start 1854537728 is beyond EOD, truncated [ 2019.285590][T13451] loop4: p78 start 1854537728 is beyond EOD, truncated [ 2019.292479][T13451] loop4: p79 start 1854537728 is beyond EOD, truncated [ 2019.304065][T13451] loop4: p80 start 1854537728 is beyond EOD, truncated [ 2019.311045][T13451] loop4: p81 start 1854537728 is beyond EOD, truncated [ 2019.324004][T13451] loop4: p82 start 1854537728 is beyond EOD, truncated [ 2019.330923][T13451] loop4: p83 start 1854537728 is beyond EOD, truncated [ 2019.343155][T13451] loop4: p84 start 1854537728 is beyond EOD, truncated [ 2019.354162][T13451] loop4: p85 start 1854537728 is beyond EOD, truncated [ 2019.361132][T13451] loop4: p86 start 1854537728 is beyond EOD, truncated [ 2019.374636][T13451] loop4: p87 start 1854537728 is beyond EOD, truncated [ 2019.381531][T13451] loop4: p88 start 1854537728 is beyond EOD, truncated [ 2019.393625][T13451] loop4: p89 start 1854537728 is beyond EOD, truncated [ 2019.400524][T13451] loop4: p90 start 1854537728 is beyond EOD, truncated [ 2019.413963][T13451] loop4: p91 start 1854537728 is beyond EOD, truncated [ 2019.420878][T13451] loop4: p92 start 1854537728 is beyond EOD, truncated [ 2019.428314][T13451] loop4: p93 start 1854537728 is beyond EOD, truncated [ 2019.444194][T13451] loop4: p94 start 1854537728 is beyond EOD, truncated [ 2019.451087][T13451] loop4: p95 start 1854537728 is beyond EOD, truncated [ 2019.458436][T13451] loop4: p96 start 1854537728 is beyond EOD, truncated [ 2019.465801][T13451] loop4: p97 start 1854537728 is beyond EOD, truncated [ 2019.472699][T13451] loop4: p98 start 1854537728 is beyond EOD, truncated [ 2019.492676][T13451] loop4: p99 start 1854537728 is beyond EOD, truncated [ 2019.500043][T13451] loop4: p100 start 1854537728 is beyond EOD, truncated [ 2019.508204][T13451] loop4: p101 start 1854537728 is beyond EOD, truncated [ 2019.515985][T13451] loop4: p102 start 1854537728 is beyond EOD, truncated [ 2019.523413][T13451] loop4: p103 start 1854537728 is beyond EOD, truncated [ 2019.536458][T13451] loop4: p104 start 1854537728 is beyond EOD, truncated [ 2019.543452][T13451] loop4: p105 start 1854537728 is beyond EOD, truncated [ 2019.563896][T13451] loop4: p106 start 1854537728 is beyond EOD, truncated [ 2019.570881][T13451] loop4: p107 start 1854537728 is beyond EOD, truncated [ 2019.578479][T13451] loop4: p108 start 1854537728 is beyond EOD, truncated [ 2019.586039][T13451] loop4: p109 start 1854537728 is beyond EOD, truncated [ 2019.593027][T13451] loop4: p110 start 1854537728 is beyond EOD, truncated [ 2019.611493][T13451] loop4: p111 start 1854537728 is beyond EOD, truncated [ 2019.619020][T13451] loop4: p112 start 1854537728 is beyond EOD, truncated [ 2019.632299][T13451] loop4: p113 start 1854537728 is beyond EOD, truncated [ 2019.640423][T13451] loop4: p114 start 1854537728 is beyond EOD, truncated [ 2019.651512][T13451] loop4: p115 start 1854537728 is beyond EOD, truncated [ 2019.663632][T13451] loop4: p116 start 1854537728 is beyond EOD, truncated [ 2019.670619][T13451] loop4: p117 start 1854537728 is beyond EOD, truncated [ 2019.680412][T13451] loop4: p118 start 1854537728 is beyond EOD, truncated [ 2019.687863][T13451] loop4: p119 start 1854537728 is beyond EOD, truncated [ 2019.695332][T13451] loop4: p120 start 1854537728 is beyond EOD, truncated [ 2019.703035][T13451] loop4: p121 start 1854537728 is beyond EOD, truncated [ 2019.710137][T13451] loop4: p122 start 1854537728 is beyond EOD, truncated [ 2019.717242][T13451] loop4: p123 start 1854537728 is beyond EOD, truncated [ 2019.724287][T13451] loop4: p124 start 1854537728 is beyond EOD, truncated [ 2019.731242][T13451] loop4: p125 start 1854537728 is beyond EOD, truncated [ 2019.738427][T13451] loop4: p126 start 1854537728 is beyond EOD, truncated [ 2019.745468][T13451] loop4: p127 start 1854537728 is beyond EOD, truncated [ 2019.752532][T13451] loop4: p128 start 1854537728 is beyond EOD, truncated [ 2019.761274][T13451] loop4: p129 start 1854537728 is beyond EOD, truncated [ 2019.768709][T13451] loop4: p130 start 1854537728 is beyond EOD, truncated [ 2019.775758][T13451] loop4: p131 start 1854537728 is beyond EOD, truncated [ 2019.782984][T13451] loop4: p132 start 1854537728 is beyond EOD, truncated [ 2019.790201][T13451] loop4: p133 start 1854537728 is beyond EOD, truncated [ 2019.797238][T13451] loop4: p134 start 1854537728 is beyond EOD, truncated [ 2019.804919][T13451] loop4: p135 start 1854537728 is beyond EOD, truncated [ 2019.811882][T13451] loop4: p136 start 1854537728 is beyond EOD, truncated [ 2019.819001][T13451] loop4: p137 start 1854537728 is beyond EOD, truncated [ 2019.826173][T13451] loop4: p138 start 1854537728 is beyond EOD, truncated [ 2019.833125][T13451] loop4: p139 start 1854537728 is beyond EOD, truncated [ 2019.840229][T13451] loop4: p140 start 1854537728 is beyond EOD, truncated [ 2019.847391][T13451] loop4: p141 start 1854537728 is beyond EOD, truncated [ 2019.854430][T13451] loop4: p142 start 1854537728 is beyond EOD, truncated [ 2019.861415][T13451] loop4: p143 start 1854537728 is beyond EOD, truncated [ 2019.868490][T13451] loop4: p144 start 1854537728 is beyond EOD, truncated [ 2019.875543][T13451] loop4: p145 start 1854537728 is beyond EOD, truncated [ 2019.882506][T13451] loop4: p146 start 1854537728 is beyond EOD, truncated [ 2019.890194][T13451] loop4: p147 start 1854537728 is beyond EOD, truncated [ 2019.898035][T13451] loop4: p148 start 1854537728 is beyond EOD, truncated [ 2019.905123][T13451] loop4: p149 start 1854537728 is beyond EOD, truncated [ 2019.912077][T13451] loop4: p150 start 1854537728 is beyond EOD, truncated [ 2019.919183][T13451] loop4: p151 start 1854537728 is beyond EOD, truncated [ 2019.926358][T13451] loop4: p152 start 1854537728 is beyond EOD, truncated [ 2019.933613][T13451] loop4: p153 start 1854537728 is beyond EOD, truncated [ 2019.940717][T13451] loop4: p154 start 1854537728 is beyond EOD, truncated [ 2019.947878][T13451] loop4: p155 start 1854537728 is beyond EOD, truncated [ 2019.955024][T13451] loop4: p156 start 1854537728 is beyond EOD, truncated [ 2019.962210][T13451] loop4: p157 start 1854537728 is beyond EOD, truncated [ 2019.970447][T13451] loop4: p158 start 1854537728 is beyond EOD, truncated [ 2019.977588][T13451] loop4: p159 start 1854537728 is beyond EOD, truncated [ 2019.984826][T13451] loop4: p160 start 1854537728 is beyond EOD, truncated [ 2019.991901][T13451] loop4: p161 start 1854537728 is beyond EOD, truncated [ 2019.999064][T13451] loop4: p162 start 1854537728 is beyond EOD, truncated [ 2020.006302][T13451] loop4: p163 start 1854537728 is beyond EOD, truncated [ 2020.013373][T13451] loop4: p164 start 1854537728 is beyond EOD, truncated [ 2020.020592][T13451] loop4: p165 start 1854537728 is beyond EOD, truncated [ 2020.028556][T13451] loop4: p166 start 1854537728 is beyond EOD, truncated [ 2020.035719][T13451] loop4: p167 start 1854537728 is beyond EOD, truncated [ 2020.042820][T13451] loop4: p168 start 1854537728 is beyond EOD, truncated [ 2020.050143][T13451] loop4: p169 start 1854537728 is beyond EOD, truncated [ 2020.057305][T13451] loop4: p170 start 1854537728 is beyond EOD, truncated [ 2020.064518][T13451] loop4: p171 start 1854537728 is beyond EOD, truncated [ 2020.071626][T13451] loop4: p172 start 1854537728 is beyond EOD, truncated [ 2020.078854][T13451] loop4: p173 start 1854537728 is beyond EOD, truncated [ 2020.086050][T13451] loop4: p174 start 1854537728 is beyond EOD, truncated [ 2020.093234][T13451] loop4: p175 start 1854537728 is beyond EOD, truncated [ 2020.100419][T13451] loop4: p176 start 1854537728 is beyond EOD, truncated [ 2020.107572][T13451] loop4: p177 start 1854537728 is beyond EOD, truncated [ 2020.117013][T13451] loop4: p178 start 1854537728 is beyond EOD, truncated [ 2020.124088][T13451] loop4: p179 start 1854537728 is beyond EOD, truncated [ 2020.131168][T13451] loop4: p180 start 1854537728 is beyond EOD, truncated [ 2020.138212][T13451] loop4: p181 start 1854537728 is beyond EOD, truncated [ 2020.145278][T13451] loop4: p182 start 1854537728 is beyond EOD, truncated [ 2020.152238][T13451] loop4: p183 start 1854537728 is beyond EOD, truncated [ 2020.159275][T13451] loop4: p184 start 1854537728 is beyond EOD, truncated [ 2020.166297][T13451] loop4: p185 start 1854537728 is beyond EOD, truncated [ 2020.173246][T13451] loop4: p186 start 1854537728 is beyond EOD, truncated [ 2020.180270][T13451] loop4: p187 start 1854537728 is beyond EOD, truncated [ 2020.187471][T13451] loop4: p188 start 1854537728 is beyond EOD, truncated [ 2020.194496][T13451] loop4: p189 start 1854537728 is beyond EOD, truncated [ 2020.201474][T13451] loop4: p190 start 1854537728 is beyond EOD, truncated [ 2020.208558][T13451] loop4: p191 start 1854537728 is beyond EOD, truncated [ 2020.215570][T13451] loop4: p192 start 1854537728 is beyond EOD, truncated [ 2020.222545][T13451] loop4: p193 start 1854537728 is beyond EOD, truncated [ 2020.229556][T13451] loop4: p194 start 1854537728 is beyond EOD, truncated [ 2020.236587][T13451] loop4: p195 start 1854537728 is beyond EOD, truncated [ 2020.243647][T13451] loop4: p196 start 1854537728 is beyond EOD, truncated [ 2020.250713][T13451] loop4: p197 start 1854537728 is beyond EOD, truncated [ 2020.258033][T13451] loop4: p198 start 1854537728 is beyond EOD, truncated [ 2020.265051][T13451] loop4: p199 start 1854537728 is beyond EOD, truncated [ 2020.272035][T13451] loop4: p200 start 1854537728 is beyond EOD, truncated [ 2020.279082][T13451] loop4: p201 start 1854537728 is beyond EOD, truncated [ 2020.286136][T13451] loop4: p202 start 1854537728 is beyond EOD, truncated [ 2020.293715][T13451] loop4: p203 start 1854537728 is beyond EOD, truncated [ 2020.300694][T13451] loop4: p204 start 1854537728 is beyond EOD, truncated [ 2020.308445][T13451] loop4: p205 start 1854537728 is beyond EOD, truncated [ 2020.315710][T13451] loop4: p206 start 1854537728 is beyond EOD, truncated [ 2020.322672][T13451] loop4: p207 start 1854537728 is beyond EOD, truncated [ 2020.329763][T13451] loop4: p208 start 1854537728 is beyond EOD, truncated [ 2020.336780][T13451] loop4: p209 start 1854537728 is beyond EOD, truncated [ 2020.343809][T13451] loop4: p210 start 1854537728 is beyond EOD, truncated [ 2020.350785][T13451] loop4: p211 start 1854537728 is beyond EOD, truncated [ 2020.357826][T13451] loop4: p212 start 1854537728 is beyond EOD, truncated [ 2020.365066][T13451] loop4: p213 start 1854537728 is beyond EOD, truncated [ 2020.372067][T13451] loop4: p214 start 1854537728 is beyond EOD, truncated [ 2020.379146][T13451] loop4: p215 start 1854537728 is beyond EOD, truncated [ 2020.386217][T13451] loop4: p216 start 1854537728 is beyond EOD, truncated [ 2020.393278][T13451] loop4: p217 start 1854537728 is beyond EOD, truncated [ 2020.400393][T13451] loop4: p218 start 1854537728 is beyond EOD, truncated [ 2020.407730][T13451] loop4: p219 start 1854537728 is beyond EOD, truncated [ 2020.415017][T13451] loop4: p220 start 1854537728 is beyond EOD, truncated [ 2020.422092][T13451] loop4: p221 start 1854537728 is beyond EOD, truncated [ 2020.429244][T13451] loop4: p222 start 1854537728 is beyond EOD, truncated [ 2020.436369][T13451] loop4: p223 start 1854537728 is beyond EOD, truncated [ 2020.443421][T13451] loop4: p224 start 1854537728 is beyond EOD, truncated [ 2020.450658][T13451] loop4: p225 start 1854537728 is beyond EOD, truncated [ 2020.457733][T13451] loop4: p226 start 1854537728 is beyond EOD, truncated [ 2020.464765][T13451] loop4: p227 start 1854537728 is beyond EOD, truncated [ 2020.471728][T13451] loop4: p228 start 1854537728 is beyond EOD, truncated [ 2020.478813][T13451] loop4: p229 start 1854537728 is beyond EOD, truncated [ 2020.485818][T13451] loop4: p230 start 1854537728 is beyond EOD, truncated [ 2020.492779][T13451] loop4: p231 start 1854537728 is beyond EOD, truncated [ 2020.499946][T13451] loop4: p232 start 1854537728 is beyond EOD, truncated [ 2020.507016][T13451] loop4: p233 start 1854537728 is beyond EOD, truncated [ 2020.514049][T13451] loop4: p234 start 1854537728 is beyond EOD, truncated [ 2020.521059][T13451] loop4: p235 start 1854537728 is beyond EOD, truncated [ 2020.529029][T13451] loop4: p236 start 1854537728 is beyond EOD, truncated [ 2020.536087][T13451] loop4: p237 start 1854537728 is beyond EOD, truncated [ 2020.543045][T13451] loop4: p238 start 1854537728 is beyond EOD, truncated [ 2020.550090][T13451] loop4: p239 start 1854537728 is beyond EOD, truncated [ 2020.557165][T13451] loop4: p240 start 1854537728 is beyond EOD, truncated [ 2020.573608][T13451] loop4: p241 start 1854537728 is beyond EOD, truncated [ 2020.580630][T13451] loop4: p242 start 1854537728 is beyond EOD, truncated [ 2020.613608][T13451] loop4: p243 start 1854537728 is beyond EOD, truncated [ 2020.620766][T13451] loop4: p244 start 1854537728 is beyond EOD, truncated [ 2020.637578][T13451] loop4: p245 start 1854537728 is beyond EOD, truncated [ 2020.657734][T13451] loop4: p246 start 1854537728 is beyond EOD, truncated [ 2020.699581][T13451] loop4: p247 start 1854537728 is beyond EOD, truncated [ 2020.719483][T13451] loop4: p248 start 1854537728 is beyond EOD, truncated [ 2020.727263][T13451] loop4: p249 start 1854537728 is beyond EOD, truncated [ 2020.735056][T13451] loop4: p250 start 1854537728 is beyond EOD, truncated [ 2020.742214][T13451] loop4: p251 start 1854537728 is beyond EOD, truncated [ 2020.749915][T13451] loop4: p252 start 1854537728 is beyond EOD, truncated [ 2020.758182][T13451] loop4: p253 start 1854537728 is beyond EOD, truncated [ 2020.765791][T13451] loop4: p254 start 1854537728 is beyond EOD, truncated [ 2020.772959][T13451] loop4: p255 start 1854537728 is beyond EOD, truncated [ 2021.715348][ T6832] device bridge_slave_1 left promiscuous mode [ 2021.721573][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 2021.784534][ T6832] device bridge_slave_0 left promiscuous mode [ 2021.790761][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 2023.526831][ T6832] device hsr_slave_1 left promiscuous mode [ 2023.569251][ T6832] device hsr_slave_0 left promiscuous mode [ 2023.628771][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 2023.640997][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 2023.653295][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2023.690338][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2023.781201][ T6832] bond0 (unregistering): Released all slaves [ 2023.880590][T13615] IPVS: ftp: loaded support on port[0] = 21 [ 2023.944477][T13615] chnl_net:caif_netlink_parms(): no params data found [ 2023.974376][T13615] bridge0: port 1(bridge_slave_0) entered blocking state [ 2023.983497][T13615] bridge0: port 1(bridge_slave_0) entered disabled state [ 2023.991637][T13615] device bridge_slave_0 entered promiscuous mode [ 2023.999873][T13615] bridge0: port 2(bridge_slave_1) entered blocking state [ 2024.007162][T13615] bridge0: port 2(bridge_slave_1) entered disabled state [ 2024.015438][T13615] device bridge_slave_1 entered promiscuous mode [ 2024.035981][T13615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2024.046604][T13615] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2024.067303][T13615] team0: Port device team_slave_0 added [ 2024.074906][T13615] team0: Port device team_slave_1 added [ 2024.135508][T13615] device hsr_slave_0 entered promiscuous mode [ 2024.174051][T13615] device hsr_slave_1 entered promiscuous mode [ 2024.225007][T13615] bridge0: port 2(bridge_slave_1) entered blocking state [ 2024.235447][T13615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2024.245060][T13615] bridge0: port 1(bridge_slave_0) entered blocking state [ 2024.254051][T13615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2024.367895][T13615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2024.391848][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2024.407878][ T3972] bridge0: port 1(bridge_slave_0) entered disabled state [ 2024.419467][ T3972] bridge0: port 2(bridge_slave_1) entered disabled state [ 2024.441836][T13615] 8021q: adding VLAN 0 to HW filter on device team0 [ 2024.458747][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2024.468588][ T3972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2024.476437][ T3972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2024.495941][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2024.505382][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 2024.513761][T14083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2024.536637][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2024.548620][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2024.571457][T13615] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2024.588029][T13615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2024.609937][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2024.634292][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2024.643243][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2024.670507][T13615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2024.685579][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:45:21 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:21 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") 01:45:21 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0060002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:21 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4368, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) read$alg(r0, &(0x7f0000000080)=""/51, 0x33) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000000)={0x8001, 0x0, 0x2000000000000000, 0x2, 0x100, 0x1}) r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000100)=r2) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a319be8be51a37ed0700000004222b2") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:21 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0xffffffffffffffff) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0x1}, 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x3, 0x1, 0x2, 0xcf3b, 0x6}, &(0x7f0000000380)=0x98) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:21 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") 01:45:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00f0002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:21 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:21 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000080)={0x400, r0, 0xfffffffffffffffd}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0x6, @rand_addr="3d5ee7ef767c21dfd19b09218592050c", 0x3f}], 0x3c) tee(r0, r0, 0x2e88, 0x8) syz_execute_func(&(0x7f0000000400)="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") 01:45:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000a2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:21 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") [ 2029.454479][ T2993] device bridge_slave_1 left promiscuous mode [ 2029.460860][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2029.514843][ T2993] device bridge_slave_0 left promiscuous mode [ 2029.521055][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2031.236732][ T2993] device hsr_slave_1 left promiscuous mode [ 2031.279360][ T2993] device hsr_slave_0 left promiscuous mode [ 2031.339737][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2031.351489][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2031.364685][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2031.390155][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2031.490860][ T2993] bond0 (unregistering): Released all slaves [ 2031.581879][T14128] IPVS: ftp: loaded support on port[0] = 21 [ 2031.647148][T14128] chnl_net:caif_netlink_parms(): no params data found [ 2031.679205][T14128] bridge0: port 1(bridge_slave_0) entered blocking state [ 2031.686682][T14128] bridge0: port 1(bridge_slave_0) entered disabled state [ 2031.694764][T14128] device bridge_slave_0 entered promiscuous mode [ 2031.702371][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 2031.709639][T14128] bridge0: port 2(bridge_slave_1) entered disabled state [ 2031.717737][T14128] device bridge_slave_1 entered promiscuous mode [ 2031.739315][T14128] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2031.749725][T14128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2031.777399][T14128] team0: Port device team_slave_0 added [ 2031.784573][T14128] team0: Port device team_slave_1 added [ 2031.837786][T14128] device hsr_slave_0 entered promiscuous mode [ 2031.904107][T14128] device hsr_slave_1 entered promiscuous mode [ 2032.005971][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.013041][T14128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2032.020468][T14128] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.027585][T14128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2032.071971][T14128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2032.087374][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2032.096526][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.104666][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.128055][T14128] 8021q: adding VLAN 0 to HW filter on device team0 [ 2032.140692][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2032.149465][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.156634][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2032.179486][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2032.189640][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.196786][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2032.233143][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2032.242628][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2032.257418][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2032.269441][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2032.282851][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2032.297343][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2032.326939][T14128] 8021q: adding VLAN 0 to HW filter on device batadv0 01:45:29 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000e2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:29 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000002c0)=0x7, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000100)={{0x6, 0x6c41}, {0x7, 0x20}, 0x3, 0x5, 0x654}) syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00c00e2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:29 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000f2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:29 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 01:45:29 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 2037.274578][ T7] device bridge_slave_1 left promiscuous mode [ 2037.280812][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2037.334695][ T7] device bridge_slave_0 left promiscuous mode [ 2037.340911][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2039.026803][ T7] device hsr_slave_1 left promiscuous mode [ 2039.069179][ T7] device hsr_slave_0 left promiscuous mode [ 2039.148605][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2039.160106][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2039.173137][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2039.217715][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2039.308724][ T7] bond0 (unregistering): Released all slaves [ 2039.402734][T14714] IPVS: ftp: loaded support on port[0] = 21 [ 2039.461871][T14714] chnl_net:caif_netlink_parms(): no params data found [ 2039.495363][T14714] bridge0: port 1(bridge_slave_0) entered blocking state [ 2039.502524][T14714] bridge0: port 1(bridge_slave_0) entered disabled state [ 2039.510536][T14714] device bridge_slave_0 entered promiscuous mode [ 2039.518885][T14714] bridge0: port 2(bridge_slave_1) entered blocking state [ 2039.526154][T14714] bridge0: port 2(bridge_slave_1) entered disabled state [ 2039.534397][T14714] device bridge_slave_1 entered promiscuous mode [ 2039.554296][T14714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2039.564656][T14714] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2039.584855][T14714] team0: Port device team_slave_0 added [ 2039.592233][T14714] team0: Port device team_slave_1 added [ 2039.646632][T14714] device hsr_slave_0 entered promiscuous mode [ 2039.694113][T14714] device hsr_slave_1 entered promiscuous mode [ 2039.783851][T14714] bridge0: port 2(bridge_slave_1) entered blocking state [ 2039.790950][T14714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2039.798496][T14714] bridge0: port 1(bridge_slave_0) entered blocking state [ 2039.805677][T14714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2039.841700][T14714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2039.860283][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2039.869886][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2039.879225][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2039.901612][T14714] 8021q: adding VLAN 0 to HW filter on device team0 [ 2039.914148][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2039.922687][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2039.929885][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2039.955305][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2039.971227][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2039.978405][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2039.996857][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2040.006165][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2040.022374][T14714] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2040.035038][T14714] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2040.048115][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2040.061791][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2040.070997][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2040.093066][T14714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2040.101448][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:45:36 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0000004a0fc7a4ea70db001f0f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00f6232500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:36 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r3 = getpgrp(0x0) r4 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r3, r4, 0x11, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffffff}) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r5, &(0x7f0000481000)=""/128, 0x80) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000080)=""/209, &(0x7f00000002c0)=0xd1) syz_execute_func(&(0x7f0000000180)="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") 01:45:36 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) socket$rds(0x15, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:36 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 01:45:36 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x1) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) 01:45:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00003f2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:36 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 01:45:37 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000602500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:37 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x800, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x8, 0x5, 0x2, 0x6, 0x6, r2}) syz_execute_func(&(0x7f0000000540)="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") 01:45:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 2044.684459][ T2993] device bridge_slave_1 left promiscuous mode [ 2044.690779][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2044.744823][ T2993] device bridge_slave_0 left promiscuous mode [ 2044.751068][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2046.426729][ T2993] device hsr_slave_1 left promiscuous mode [ 2046.496995][ T2993] device hsr_slave_0 left promiscuous mode [ 2046.550076][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2046.561702][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2046.573429][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2046.637760][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2046.728619][ T2993] bond0 (unregistering): Released all slaves [ 2046.862739][T15045] IPVS: ftp: loaded support on port[0] = 21 [ 2046.927117][T15045] chnl_net:caif_netlink_parms(): no params data found [ 2046.962041][T15045] bridge0: port 1(bridge_slave_0) entered blocking state [ 2046.969542][T15045] bridge0: port 1(bridge_slave_0) entered disabled state [ 2046.977803][T15045] device bridge_slave_0 entered promiscuous mode [ 2046.986206][T15045] bridge0: port 2(bridge_slave_1) entered blocking state [ 2046.995415][T15045] bridge0: port 2(bridge_slave_1) entered disabled state [ 2047.003511][T15045] device bridge_slave_1 entered promiscuous mode [ 2047.025380][T15045] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2047.036160][T15045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2047.052018][T15045] team0: Port device team_slave_0 added [ 2047.060791][T15045] team0: Port device team_slave_1 added [ 2047.126528][T15045] device hsr_slave_0 entered promiscuous mode [ 2047.193936][T15045] device hsr_slave_1 entered promiscuous mode [ 2047.297122][T15045] bridge0: port 2(bridge_slave_1) entered blocking state [ 2047.304386][T15045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2047.311746][T15045] bridge0: port 1(bridge_slave_0) entered blocking state [ 2047.318942][T15045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2047.358066][T15045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2047.373526][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2047.382818][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2047.392004][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2047.407348][T15045] 8021q: adding VLAN 0 to HW filter on device team0 [ 2047.420542][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2047.430231][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2047.437406][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2047.456361][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2047.465538][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2047.472644][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2047.507090][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2047.516619][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2047.532159][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2047.541140][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2047.558671][T15045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2047.572336][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2047.609851][T15045] 8021q: adding VLAN 0 to HW filter on device batadv0 01:45:44 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000ec02500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:44 executing program 4: r0 = creat(&(0x7f0000000880)='./file0\x00', 0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000900)='TIPC\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x300, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x80) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x1c, r1, 0xb00, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x800) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="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") 01:45:44 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 01:45:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:44 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 01:45:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000f02500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:44 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0023f62500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:44 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 01:45:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000000500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2052.574229][ T2993] device bridge_slave_1 left promiscuous mode [ 2052.580823][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2052.644807][ T2993] device bridge_slave_0 left promiscuous mode [ 2052.651041][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2054.346847][ T2993] device hsr_slave_1 left promiscuous mode [ 2054.397320][ T2993] device hsr_slave_0 left promiscuous mode [ 2054.462702][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2054.477516][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2054.488877][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2054.550151][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2054.641636][ T2993] bond0 (unregistering): Released all slaves [ 2054.762764][T15488] IPVS: ftp: loaded support on port[0] = 21 [ 2054.831905][T15488] chnl_net:caif_netlink_parms(): no params data found [ 2054.877838][T15488] bridge0: port 1(bridge_slave_0) entered blocking state [ 2054.885606][T15488] bridge0: port 1(bridge_slave_0) entered disabled state [ 2054.893451][T15488] device bridge_slave_0 entered promiscuous mode [ 2054.901524][T15488] bridge0: port 2(bridge_slave_1) entered blocking state [ 2054.913232][T15488] bridge0: port 2(bridge_slave_1) entered disabled state [ 2054.921591][T15488] device bridge_slave_1 entered promiscuous mode [ 2054.946317][T15488] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2054.958803][T15488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2054.981275][T15488] team0: Port device team_slave_0 added [ 2054.989561][T15488] team0: Port device team_slave_1 added [ 2055.048834][T15488] device hsr_slave_0 entered promiscuous mode [ 2055.104186][T15488] device hsr_slave_1 entered promiscuous mode [ 2055.223893][T15488] bridge0: port 2(bridge_slave_1) entered blocking state [ 2055.231006][T15488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2055.238485][T15488] bridge0: port 1(bridge_slave_0) entered blocking state [ 2055.245653][T15488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2055.298140][T15488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2055.314244][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2055.323348][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2055.332551][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2055.350167][T15488] 8021q: adding VLAN 0 to HW filter on device team0 [ 2055.362719][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2055.372258][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2055.379449][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2055.405923][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2055.415286][ T3972] bridge0: port 2(bridge_slave_1) entered blocking state [ 2055.422381][ T3972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2055.452191][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2055.468314][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2055.493089][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2055.507483][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2055.518499][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2055.534021][T15488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2055.572504][T15488] 8021q: adding VLAN 0 to HW filter on device batadv0 01:45:52 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:52 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000000f00e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:52 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) flock(r0, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x400540) bind$tipc(r1, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e23}}, 0x10) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:45:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000022500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:52 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:52 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000042500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:52 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) syz_execute_func(&(0x7f0000000680)="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") ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f00000000c0)={0x1, 0x80, 0x1, 0x9}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000140)='syz1\x00') 01:45:52 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000a2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:52 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 2060.334531][ T2993] device bridge_slave_1 left promiscuous mode [ 2060.341076][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2060.394694][ T2993] device bridge_slave_0 left promiscuous mode [ 2060.400882][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.056709][ T2993] device hsr_slave_1 left promiscuous mode [ 2062.127441][ T2993] device hsr_slave_0 left promiscuous mode [ 2062.167086][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2062.180629][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2062.192174][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2062.218017][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2062.309001][ T2993] bond0 (unregistering): Released all slaves [ 2062.452034][T16122] IPVS: ftp: loaded support on port[0] = 21 [ 2062.515623][T16122] chnl_net:caif_netlink_parms(): no params data found [ 2062.550125][T16122] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.557504][T16122] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.565632][T16122] device bridge_slave_0 entered promiscuous mode [ 2062.573498][T16122] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.580854][T16122] bridge0: port 2(bridge_slave_1) entered disabled state [ 2062.588601][T16122] device bridge_slave_1 entered promiscuous mode [ 2062.608602][T16122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2062.618988][T16122] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2062.638597][T16122] team0: Port device team_slave_0 added [ 2062.645729][T16122] team0: Port device team_slave_1 added [ 2062.726711][T16122] device hsr_slave_0 entered promiscuous mode [ 2062.784082][T16122] device hsr_slave_1 entered promiscuous mode [ 2062.848854][T16122] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.856023][T16122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2062.863344][T16122] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.870518][T16122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2062.935021][T16122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2062.949714][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2062.961271][T14088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.969811][T14088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2062.985677][T16122] 8021q: adding VLAN 0 to HW filter on device team0 [ 2062.997834][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2063.007446][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2063.014651][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2063.034353][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2063.042872][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2063.050049][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2063.073182][T16122] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2063.085229][T16122] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2063.099128][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2063.108965][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2063.118828][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2063.132741][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2063.159430][T16122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2063.169704][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2063.178707][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 01:45:59 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000e2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:45:59 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="0ef4e5f6"], &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x7}, &(0x7f0000000300)=0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000200)=0x0) ioprio_get$pid(0x2, r3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendto$llc(r0, &(0x7f0000000100)="370a81979603ce08cd8b1c371ff145b6f20f01846f54eac7c46fb2c7581a3799e071325a22d7e34830927be62b8eebbcf9aeb6ea64966430645ccd6a4cad0b8f697f649630084a9e9119a871c86f8d5804b53ee1a2c7b1e63628421c8c7709d15a543b60f286cbbb2655d1aef9d9a7e6754434fc163e439672cfc08a0ce1bd8551dded12b100e59ac9bf1c0e61055018cf305185527a381672950ce6ed3a12ffbdc429376db69534178f41d617108914579df855003ea9ed73132a2a5e71bc34b02cb2a9860f417cc383c4dad2ec750807f66f7a9e84748def03d5715bb3ebf33fa0895799b35801ed495a14e862", 0xee, 0x10, &(0x7f0000000080)={0x1a, 0x317, 0xfd2, 0x2, 0xff, 0x7, @local}, 0x10) syz_execute_func(&(0x7f00000007c0)="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") ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000040)={0x80000000}) 01:45:59 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:45:59 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000080)={0x100000000, 0x9, 0x1ff, 0x6}, 0x10) syz_execute_func(&(0x7f0000000180)="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") 01:46:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000f2500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:00 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:46:00 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:46:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000602500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:00 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x18, "ab3abb166d4e16bc0ac028b74b0b2ca0b7ce72cf8d436363"}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e21, 0x9, @mcast2, 0x5}}, 0x1, 0x2}, 0x90) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0aba1f123c1261319bd070") syz_execute_func(&(0x7f0000000400)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000001c0)={0x0, 0x2, 0x7ff, 0xffffffffffffa0b5, 'syz1\x00', 0x5ec}) 01:46:00 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000080)=0x9, 0x4) 01:46:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000003f00e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2068.124883][T11867] device bridge_slave_1 left promiscuous mode [ 2068.131162][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2068.184921][T11867] device bridge_slave_0 left promiscuous mode [ 2068.191163][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2069.866643][T11867] device hsr_slave_1 left promiscuous mode [ 2069.909173][T11867] device hsr_slave_0 left promiscuous mode [ 2069.968592][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2069.980088][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2069.992622][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2070.049928][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2070.140848][T11867] bond0 (unregistering): Released all slaves [ 2070.261072][T16677] IPVS: ftp: loaded support on port[0] = 21 [ 2070.325045][T16677] chnl_net:caif_netlink_parms(): no params data found [ 2070.366803][T16677] bridge0: port 1(bridge_slave_0) entered blocking state [ 2070.374163][T16677] bridge0: port 1(bridge_slave_0) entered disabled state [ 2070.382161][T16677] device bridge_slave_0 entered promiscuous mode [ 2070.390309][T16677] bridge0: port 2(bridge_slave_1) entered blocking state [ 2070.397887][T16677] bridge0: port 2(bridge_slave_1) entered disabled state [ 2070.406242][T16677] device bridge_slave_1 entered promiscuous mode [ 2070.422830][T16677] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2070.433315][T16677] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2070.453892][T16677] team0: Port device team_slave_0 added [ 2070.461217][T16677] team0: Port device team_slave_1 added [ 2070.576369][T16677] device hsr_slave_0 entered promiscuous mode [ 2070.604048][T16677] device hsr_slave_1 entered promiscuous mode [ 2070.673459][T16677] bridge0: port 2(bridge_slave_1) entered blocking state [ 2070.680651][T16677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2070.688109][T16677] bridge0: port 1(bridge_slave_0) entered blocking state [ 2070.695252][T16677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2070.762133][T16677] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2070.788776][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2070.800669][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2070.813220][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2070.839359][T16677] 8021q: adding VLAN 0 to HW filter on device team0 [ 2070.860476][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2070.876557][ T4088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2070.883725][ T4088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2070.908454][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2070.922094][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2070.929485][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2070.962026][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2070.973450][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2070.997653][T16677] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2071.013286][T16677] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2071.032284][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2071.041353][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2071.056333][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2071.081647][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2071.099185][T16677] 8021q: adding VLAN 0 to HW filter on device batadv0 01:46:07 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000000500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:07 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:46:07 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = gettid() fcntl$setown(r0, 0x8, r2) syz_execute_func(&(0x7f0000000180)="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") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000080)) 01:46:07 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 01:46:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000000f00e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:07 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000080)="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") 01:46:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002502e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:08 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:46:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002504e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:08 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 01:46:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000000250ae1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2075.774800][T11867] device bridge_slave_1 left promiscuous mode [ 2075.781037][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2075.844647][T11867] device bridge_slave_0 left promiscuous mode [ 2075.850935][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2077.546636][T11867] device hsr_slave_1 left promiscuous mode [ 2077.589283][T11867] device hsr_slave_0 left promiscuous mode [ 2077.650829][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2077.661723][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2077.673732][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2077.727510][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2077.831737][T11867] bond0 (unregistering): Released all slaves [ 2077.941523][T17212] IPVS: ftp: loaded support on port[0] = 21 [ 2078.005365][T17212] chnl_net:caif_netlink_parms(): no params data found [ 2078.047608][T17212] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.055971][T17212] bridge0: port 1(bridge_slave_0) entered disabled state [ 2078.064027][T17212] device bridge_slave_0 entered promiscuous mode [ 2078.072173][T17212] bridge0: port 2(bridge_slave_1) entered blocking state [ 2078.079719][T17212] bridge0: port 2(bridge_slave_1) entered disabled state [ 2078.088200][T17212] device bridge_slave_1 entered promiscuous mode [ 2078.106418][T17212] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2078.117250][T17212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2078.138511][T17212] team0: Port device team_slave_0 added [ 2078.146113][T17212] team0: Port device team_slave_1 added [ 2078.218827][T17212] device hsr_slave_0 entered promiscuous mode [ 2078.274213][T17212] device hsr_slave_1 entered promiscuous mode [ 2078.387679][T17212] bridge0: port 2(bridge_slave_1) entered blocking state [ 2078.394870][T17212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2078.402185][T17212] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.409369][T17212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2078.443530][T17212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2078.459429][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2078.469798][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2078.479199][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2078.494474][T17212] 8021q: adding VLAN 0 to HW filter on device team0 [ 2078.509606][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2078.519497][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.526712][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2078.555653][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2078.565584][ T3972] bridge0: port 2(bridge_slave_1) entered blocking state [ 2078.572718][ T3972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2078.588520][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2078.600686][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2078.619423][T17212] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2078.631864][T17212] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2078.645097][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2078.653332][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2078.663218][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2078.684672][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2078.695357][T17212] 8021q: adding VLAN 0 to HW filter on device batadv0 01:46:15 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0000004a0fc7a4ea70db00001f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:46:15 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") 01:46:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000000250ee1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:15 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) setxattr$security_selinux(&(0x7f0000000080)='.\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getpeername$ax25(r0, &(0x7f0000001540)={{}, [@rose, @netrom, @null, @default, @rose, @rose, @rose, @null]}, &(0x7f00000015c0)=0x48) lsetxattr(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)=@random={'system.', '/dev/snd/pcmC#D#p\x00'}, &(0x7f0000001500)=':6\x00', 0x3, 0x1) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000140)='ceph\x00', &(0x7f00000002c0)='./file0\x00', 0x40, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000300)="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", 0x1000, 0xf133}, {&(0x7f0000001300)="44b6b6", 0x3, 0x1}, {&(0x7f0000001340)="9c8e49f64935cd1ec4ba59bfdd7007c64af2b24111f05c9088d7044c5e141943d274c91f0244322971702e5f2e3fecc2b8f79087886da80bfac29e66a0459d7d7c2cc594365bd479bacec54ec7c415fb4d238fd1679f830df69a7d5627e9990a9260f2caf14e", 0x66, 0x8}], 0x82000, &(0x7f0000001440)='security.selinux\x00') [ 2080.568742][ T26] audit: type=1400 audit(1556761575.511:169): avc: denied { relabelto } for pid=17444 comm="syz-executor.4" name="3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 01:46:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e000000250fe1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2080.614682][ T26] audit: type=1400 audit(1556761575.561:170): avc: denied { search } for pid=17444 comm="syz-executor.4" name="3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 01:46:15 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="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") [ 2080.717789][ T26] audit: type=1400 audit(1556761575.631:171): avc: denied { write } for pid=17444 comm="syz-executor.4" name="3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 01:46:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002560e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2080.772943][ T26] audit: type=1400 audit(1556761575.631:172): avc: denied { add_name } for pid=17444 comm="syz-executor.4" name="file0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 [ 2080.844218][ T26] audit: type=1400 audit(1556761575.631:173): avc: denied { create } for pid=17444 comm="syz-executor.4" name="file0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 01:46:15 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:46:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf02250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2080.872182][ T26] audit: type=1400 audit(1556761575.631:174): avc: denied { mounton } for pid=17444 comm="syz-executor.4" path="/root/syzkaller-testdir312805280/syzkaller.Huq8Iy/3662/file0" dev="sda1" ino=16518 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 [ 2080.920013][ T26] audit: type=1400 audit(1556761575.741:175): avc: denied { relabelfrom } for pid=17444 comm="syz-executor.4" name="3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 01:46:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf03250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:15 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000004c0)="0adc1f123c125e521ff87002e1263658fbe335981d19253156e8a9be278de358b20fd39635fe1baf26709a77998370770800000022b18e402f8db52b64036e34e43b494f13b006b2be6b61eacbf61eb9e1968711c6cb02dd072769e1ab6dfbf3081d537dfae643bf428dd6d55f754cc5ee5fa4eb9842d0c4a19b46518f4adfa2398f3e6aadb46b9dcb2b7ad368826a66954df1a62ae3db4eaad1bf71183e231654758895deaf43ef8b52490119ecf82a6067c0d2fdce68c639760a0328a54f851145770e1f6816147db83a55d98552957c067d36063c151e0f33a92d7b10bab939ee56ac32113328197702c643695513fd00"/255) syz_execute_func(&(0x7f0000000180)="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") lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f00000002c0)) setregid(r1, r2) [ 2081.018454][ T26] audit: type=1400 audit(1556761575.961:176): avc: denied { read } for pid=8453 comm="syz-executor.4" name="3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 01:46:16 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") [ 2081.107126][ T26] audit: type=1400 audit(1556761575.961:177): avc: denied { open } for pid=8453 comm="syz-executor.4" path="/root/syzkaller-testdir312805280/syzkaller.Huq8Iy/3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 [ 2081.201956][ T26] audit: type=1400 audit(1556761575.961:178): avc: denied { getattr } for pid=8453 comm="syz-executor.4" path="/root/syzkaller-testdir312805280/syzkaller.Huq8Iy/3662" dev="sda1" ino=16515 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:watchdog_device_t:s0 tclass=dir permissive=1 [ 2083.744522][ T7] device bridge_slave_1 left promiscuous mode [ 2083.750823][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2083.814390][ T7] device bridge_slave_0 left promiscuous mode [ 2083.820577][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2085.537227][ T7] device hsr_slave_1 left promiscuous mode [ 2085.599092][ T7] device hsr_slave_0 left promiscuous mode [ 2085.667273][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2085.681040][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2085.693114][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2085.750296][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2085.822368][ T7] bond0 (unregistering): Released all slaves [ 2085.921095][T17660] IPVS: ftp: loaded support on port[0] = 21 [ 2085.986438][T17660] chnl_net:caif_netlink_parms(): no params data found [ 2086.020588][T17660] bridge0: port 1(bridge_slave_0) entered blocking state [ 2086.028404][T17660] bridge0: port 1(bridge_slave_0) entered disabled state [ 2086.036884][T17660] device bridge_slave_0 entered promiscuous mode [ 2086.049715][T17660] bridge0: port 2(bridge_slave_1) entered blocking state [ 2086.058974][T17660] bridge0: port 2(bridge_slave_1) entered disabled state [ 2086.067312][T17660] device bridge_slave_1 entered promiscuous mode [ 2086.083298][T17660] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2086.094151][T17660] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2086.115242][T17660] team0: Port device team_slave_0 added [ 2086.122331][T17660] team0: Port device team_slave_1 added [ 2086.236534][T17660] device hsr_slave_0 entered promiscuous mode [ 2086.264105][T17660] device hsr_slave_1 entered promiscuous mode [ 2086.321700][T17660] bridge0: port 2(bridge_slave_1) entered blocking state [ 2086.328898][T17660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2086.336603][T17660] bridge0: port 1(bridge_slave_0) entered blocking state [ 2086.343759][T17660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2086.413289][T17660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2086.442257][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2086.460058][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2086.469004][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2086.489606][T17660] 8021q: adding VLAN 0 to HW filter on device team0 [ 2086.502931][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2086.512444][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2086.519659][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2086.538177][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2086.546942][ T3972] bridge0: port 2(bridge_slave_1) entered blocking state [ 2086.554215][ T3972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2086.575977][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2086.585518][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2086.601614][T17660] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2086.612917][T17660] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2086.633296][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2086.642664][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2086.658682][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2086.682809][T17660] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2086.691416][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:46:23 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:23 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") 01:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04050300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:23 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000080)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="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") getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) 01:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf040f0300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:23 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000180)="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") 01:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250200a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:23 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 01:46:23 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x4000001000008914, &(0x7f0000000080)="0adc1f123c123f319bd070") openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) syz_execute_func(&(0x7f0000000180)="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") ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f00000000c0)=0x9) 01:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250400a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:23 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 01:46:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04251000a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2090.934397][ T6832] device bridge_slave_1 left promiscuous mode [ 2090.940625][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 2090.984824][ T6832] device bridge_slave_0 left promiscuous mode [ 2090.991062][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 2092.675766][ T6832] device hsr_slave_1 left promiscuous mode [ 2092.729331][ T6832] device hsr_slave_0 left promiscuous mode [ 2092.788613][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 2092.800807][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 2092.812688][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2092.850350][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2092.940690][ T6832] bond0 (unregistering): Released all slaves [ 2093.052587][T18162] IPVS: ftp: loaded support on port[0] = 21 [ 2093.118159][T18162] chnl_net:caif_netlink_parms(): no params data found [ 2093.160971][T18162] bridge0: port 1(bridge_slave_0) entered blocking state [ 2093.168285][T18162] bridge0: port 1(bridge_slave_0) entered disabled state [ 2093.177314][T18162] device bridge_slave_0 entered promiscuous mode [ 2093.186015][T18162] bridge0: port 2(bridge_slave_1) entered blocking state [ 2093.193222][T18162] bridge0: port 2(bridge_slave_1) entered disabled state [ 2093.201207][T18162] device bridge_slave_1 entered promiscuous mode [ 2093.221769][T18162] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2093.232536][T18162] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2093.254715][T18162] team0: Port device team_slave_0 added [ 2093.264206][T18162] team0: Port device team_slave_1 added [ 2093.316416][T18162] device hsr_slave_0 entered promiscuous mode [ 2093.354040][T18162] device hsr_slave_1 entered promiscuous mode [ 2093.482244][T18162] bridge0: port 2(bridge_slave_1) entered blocking state [ 2093.489733][T18162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2093.497322][T18162] bridge0: port 1(bridge_slave_0) entered blocking state [ 2093.504562][T18162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2093.541617][T18162] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2093.555540][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2093.569082][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 2093.580841][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 2093.613783][T18162] 8021q: adding VLAN 0 to HW filter on device team0 [ 2093.629753][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2093.639063][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2093.646241][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2093.665436][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2093.675176][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2093.682293][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2093.707434][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2093.717171][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2093.726540][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2093.737729][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2093.749171][T18162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2093.759540][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2093.782114][T18162] 8021q: adding VLAN 0 to HW filter on device batadv0 01:46:30 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:30 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000080)={0x3, 0x91}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0xf, 0x3}, 0x14) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:46:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250124a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:30 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000180)="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") 01:46:30 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:30 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 01:46:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250302a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:31 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x1000, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250304a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:31 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 01:46:31 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) syz_emit_ethernet(0x165, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)={0x1, 0x4, [0xd9e, 0x18f, 0xc87, 0x558]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x1000000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x1010, r0, 0x0) syz_execute_func(&(0x7f0000000580)="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") ioctl$TIOCCBRK(r0, 0x5428) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f00000000c0)={0x0, 0x5}) 01:46:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf0425030aa06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2098.644721][ T2993] device bridge_slave_1 left promiscuous mode [ 2098.650986][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2098.704863][ T2993] device bridge_slave_0 left promiscuous mode [ 2098.711064][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2100.367177][ T2993] device hsr_slave_1 left promiscuous mode [ 2100.417164][ T2993] device hsr_slave_0 left promiscuous mode [ 2100.476687][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2100.489994][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2100.501496][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2100.569068][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2100.654930][ T2993] bond0 (unregistering): Released all slaves [ 2100.771858][T18899] IPVS: ftp: loaded support on port[0] = 21 [ 2100.836495][T18899] chnl_net:caif_netlink_parms(): no params data found [ 2100.878813][T18899] bridge0: port 1(bridge_slave_0) entered blocking state [ 2100.886118][T18899] bridge0: port 1(bridge_slave_0) entered disabled state [ 2100.894290][T18899] device bridge_slave_0 entered promiscuous mode [ 2100.902461][T18899] bridge0: port 2(bridge_slave_1) entered blocking state [ 2100.910150][T18899] bridge0: port 2(bridge_slave_1) entered disabled state [ 2100.918563][T18899] device bridge_slave_1 entered promiscuous mode [ 2100.942118][T18899] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2100.952787][T18899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2100.972427][T18899] team0: Port device team_slave_0 added [ 2100.981552][T18899] team0: Port device team_slave_1 added [ 2101.036532][T18899] device hsr_slave_0 entered promiscuous mode [ 2101.104113][T18899] device hsr_slave_1 entered promiscuous mode [ 2101.155813][T18899] bridge0: port 2(bridge_slave_1) entered blocking state [ 2101.162937][T18899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2101.170389][T18899] bridge0: port 1(bridge_slave_0) entered blocking state [ 2101.177553][T18899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2101.273354][T18899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2101.288774][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2101.299130][ T3976] bridge0: port 1(bridge_slave_0) entered disabled state [ 2101.307386][ T3976] bridge0: port 2(bridge_slave_1) entered disabled state [ 2101.321572][T18899] 8021q: adding VLAN 0 to HW filter on device team0 [ 2101.334924][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2101.343442][ T3976] bridge0: port 1(bridge_slave_0) entered blocking state [ 2101.350640][ T3976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2101.374876][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2101.383407][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2101.390626][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2101.399971][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2101.420266][T18899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2101.431500][T18899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2101.444677][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2101.452948][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2101.470003][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2101.479182][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2101.504944][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2101.516965][T18899] 8021q: adding VLAN 0 to HW filter on device batadv0 01:46:38 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:38 executing program 0: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) 01:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf0425030ea06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:38 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKRRPART(r0, 0x125f, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "cbc4ad5ff5b2eca01b8d05e197f8e5e5"}, 0x11, 0x2) syz_execute_func(&(0x7f0000000180)="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") 01:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf0425030fa06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:38 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) 01:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250360a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec402002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:38 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)={0x7, 0x1, 0x1ef4}) syz_execute_func(&(0x7f0000000180)="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") 01:46:38 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x800) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000002c0)={0x3, 0x2}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x59, 0xfffffffffffffffd, 0x10000, 0x5}, {0x3c, 0x0, 0x9, 0x9}, {0x100, 0xfffffffffffffffd, 0x0, 0x9}]}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x9, 0x5, 0x1f, 0x9, 0x7fff}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000380)={r3, @in={{0x2, 0x4e21, @broadcast}}, 0xbf, 0x6}, &(0x7f0000000440)=0x90) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") sendto$rxrpc(r0, &(0x7f00000000c0)="246fd9f3c0a214fb3f6246c8fa45f683f18deb73", 0x14, 0x40050, 0x0, 0x0) 01:46:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec404002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:38 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x80000000}) ioctl(r1, 0x200, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 2106.304580][T11867] device bridge_slave_1 left promiscuous mode [ 2106.310910][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2106.365571][T11867] device bridge_slave_0 left promiscuous mode [ 2106.371786][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.026758][T11867] device hsr_slave_1 left promiscuous mode [ 2108.070789][T11867] device hsr_slave_0 left promiscuous mode [ 2108.109482][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2108.121306][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2108.133362][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2108.187843][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2108.282087][T11867] bond0 (unregistering): Released all slaves [ 2108.432367][T19628] IPVS: ftp: loaded support on port[0] = 21 [ 2108.505742][T19628] chnl_net:caif_netlink_parms(): no params data found [ 2108.540692][T19628] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.547996][T19628] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.555827][T19628] device bridge_slave_0 entered promiscuous mode [ 2108.563870][T19628] bridge0: port 2(bridge_slave_1) entered blocking state [ 2108.571072][T19628] bridge0: port 2(bridge_slave_1) entered disabled state [ 2108.578902][T19628] device bridge_slave_1 entered promiscuous mode [ 2108.601270][T19628] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2108.611922][T19628] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2108.632204][T19628] team0: Port device team_slave_0 added [ 2108.639434][T19628] team0: Port device team_slave_1 added [ 2108.716714][T19628] device hsr_slave_0 entered promiscuous mode [ 2108.754135][T19628] device hsr_slave_1 entered promiscuous mode [ 2108.806603][T19628] bridge0: port 2(bridge_slave_1) entered blocking state [ 2108.813754][T19628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2108.821270][T19628] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.828436][T19628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2108.939379][T19628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2108.951656][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2108.960518][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.969011][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 2108.983493][T19628] 8021q: adding VLAN 0 to HW filter on device team0 [ 2108.997563][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2109.006599][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 2109.013893][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2109.036149][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2109.046976][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2109.054173][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2109.069589][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2109.095335][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2109.104418][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2109.113115][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2109.122303][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2109.134505][T19628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2109.172859][T19628] 8021q: adding VLAN 0 to HW filter on device batadv0 01:46:46 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl(r0, 0x7fff, &(0x7f00000002c0)="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") 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40e002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40f002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec460002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_SET_FPEXC(0xc, 0x2) syz_execute_func(&(0x7f0000000180)="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") 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4f0002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f00000002c0)={0x80000000, 0x101, "089c74000cb9803e8d5a27638134c1372b850b1f8ba66ffe9f8981db838b6c30", 0x7, 0x10001, 0xfffffffffffffffb, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x80, [0x8, 0x3, 0x2, 0x2]}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x801, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4000a2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4000e2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:46 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") connect$ax25(r0, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) [ 2114.224534][T11867] device bridge_slave_1 left promiscuous mode [ 2114.230964][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2114.264865][T11867] device bridge_slave_0 left promiscuous mode [ 2114.271290][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2116.016778][T11867] device hsr_slave_1 left promiscuous mode [ 2116.069357][T11867] device hsr_slave_0 left promiscuous mode [ 2116.128951][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2116.141069][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2116.152795][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2116.217993][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2116.301929][T11867] bond0 (unregistering): Released all slaves [ 2116.390797][T20372] IPVS: ftp: loaded support on port[0] = 21 [ 2116.452728][T20372] chnl_net:caif_netlink_parms(): no params data found [ 2116.491295][T20372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2116.498663][T20372] bridge0: port 1(bridge_slave_0) entered disabled state [ 2116.506589][T20372] device bridge_slave_0 entered promiscuous mode [ 2116.514753][T20372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2116.522016][T20372] bridge0: port 2(bridge_slave_1) entered disabled state [ 2116.530028][T20372] device bridge_slave_1 entered promiscuous mode [ 2116.551202][T20372] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2116.562752][T20372] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2116.584584][T20372] team0: Port device team_slave_0 added [ 2116.592112][T20372] team0: Port device team_slave_1 added [ 2116.636604][T20372] device hsr_slave_0 entered promiscuous mode [ 2116.674225][T20372] device hsr_slave_1 entered promiscuous mode [ 2116.782662][T20372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2116.790665][T20372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2116.798189][T20372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2116.805378][T20372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2116.862183][T20372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2116.879591][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2116.889064][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 2116.898947][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 2116.931316][T20372] 8021q: adding VLAN 0 to HW filter on device team0 [ 2116.950315][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2116.959928][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 2116.967593][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2116.995028][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2117.005163][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2117.012398][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2117.034936][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2117.044367][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2117.053337][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2117.067993][T20372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2117.080977][T20372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2117.090048][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2117.099227][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2117.122808][T20372] 8021q: adding VLAN 0 to HW filter on device batadv0 01:46:54 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4c00e2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x2100) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x101000, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000340)={0x7, 0x33, 0x2}, 0x7) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000380)=0x400) r4 = fcntl$getown(r2, 0x9) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000000080)=""/178, 0xb2}) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0xf4265016ccf9519b}, 0x4008000) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000003c0)=0xb0, &(0x7f0000000400)=0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000d80)=ANY=[@ANYBLOB="3f000000000000000a004e2400000005fe8000000000000000000000000000bb090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000a004e2000000009fe8800000000000000000000000001010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003eeca47d3812b085bfa500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e240000003dfe8000000000000000000000000000bb04000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000005fe8000000000000000000000000000bb07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000009ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000006000000000000000000000000000000013c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210000982100000000000000000000000000000000ff7f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000004fe88000000000000000000000000010101f0ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000a004e230000ffff89abba3903416ac60000000000000001c40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c88a296e1d2f4844b2e043a6196c767b5180789c04ee58d52c9cb6331e010c96268c1d89e47"], 0x490) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000780)="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") 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4000f2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4f6232339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4003f2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400602339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40ec02339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400f02339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec423f62339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400022339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:46:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400042339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2122.394297][ T2993] device bridge_slave_1 left promiscuous mode [ 2122.400546][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2122.464891][ T2993] device bridge_slave_0 left promiscuous mode [ 2122.471208][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2124.216874][ T2993] device hsr_slave_1 left promiscuous mode [ 2124.288348][ T2993] device hsr_slave_0 left promiscuous mode [ 2124.339474][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2124.351150][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2124.362755][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2124.428453][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2124.521197][ T2993] bond0 (unregistering): Released all slaves [ 2124.642652][T20831] IPVS: ftp: loaded support on port[0] = 21 [ 2124.708692][T20831] chnl_net:caif_netlink_parms(): no params data found [ 2124.744123][T20831] bridge0: port 1(bridge_slave_0) entered blocking state [ 2124.751441][T20831] bridge0: port 1(bridge_slave_0) entered disabled state [ 2124.760318][T20831] device bridge_slave_0 entered promiscuous mode [ 2124.769391][T20831] bridge0: port 2(bridge_slave_1) entered blocking state [ 2124.777060][T20831] bridge0: port 2(bridge_slave_1) entered disabled state [ 2124.785135][T20831] device bridge_slave_1 entered promiscuous mode [ 2124.806933][T20831] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2124.817866][T20831] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2124.837809][T20831] team0: Port device team_slave_0 added [ 2124.851937][T20831] team0: Port device team_slave_1 added [ 2124.896854][T20831] device hsr_slave_0 entered promiscuous mode [ 2124.934225][T20831] device hsr_slave_1 entered promiscuous mode [ 2125.055553][T20831] bridge0: port 2(bridge_slave_1) entered blocking state [ 2125.062720][T20831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2125.070220][T20831] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.077419][T20831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2125.149726][T20831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2125.165662][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2125.175559][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 2125.184903][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 2125.200315][T20831] 8021q: adding VLAN 0 to HW filter on device team0 [ 2125.213057][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2125.222929][ T4308] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.230138][ T4308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2125.248514][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2125.257534][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2125.264800][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2125.286033][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2125.295853][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2125.321111][T20831] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2125.338463][T20831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2125.352581][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2125.368862][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2125.381648][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2125.407070][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2125.430074][T20831] 8021q: adding VLAN 0 to HW filter on device batadv0 01:47:02 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:02 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008913, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000080)={'ip6tnl0\x00', 0x3, 0x2}) 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4000a2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4000e2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:02 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000000c0)={0x10001, 0x9}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4000f2339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400602339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:02 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x40400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00886f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:02 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c127a009bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e02586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b250016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2130.285337][ T7] device bridge_slave_1 left promiscuous mode [ 2130.291608][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2130.355073][ T7] device bridge_slave_0 left promiscuous mode [ 2130.361400][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2132.086836][ T7] device hsr_slave_1 left promiscuous mode [ 2132.129386][ T7] device hsr_slave_0 left promiscuous mode [ 2132.188834][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2132.200531][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2132.214193][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2132.249663][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2132.321057][ T7] bond0 (unregistering): Released all slaves [ 2132.420635][T21576] IPVS: ftp: loaded support on port[0] = 21 [ 2132.496049][T21576] chnl_net:caif_netlink_parms(): no params data found [ 2132.528921][T21576] bridge0: port 1(bridge_slave_0) entered blocking state [ 2132.536300][T21576] bridge0: port 1(bridge_slave_0) entered disabled state [ 2132.544573][T21576] device bridge_slave_0 entered promiscuous mode [ 2132.552494][T21576] bridge0: port 2(bridge_slave_1) entered blocking state [ 2132.559795][T21576] bridge0: port 2(bridge_slave_1) entered disabled state [ 2132.567720][T21576] device bridge_slave_1 entered promiscuous mode [ 2132.588435][T21576] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2132.598747][T21576] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2132.621652][T21576] team0: Port device team_slave_0 added [ 2132.629453][T21576] team0: Port device team_slave_1 added [ 2132.675500][T21576] device hsr_slave_0 entered promiscuous mode [ 2132.724099][T21576] device hsr_slave_1 entered promiscuous mode [ 2132.853989][T21576] bridge0: port 2(bridge_slave_1) entered blocking state [ 2132.861249][T21576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2132.868700][T21576] bridge0: port 1(bridge_slave_0) entered blocking state [ 2132.875869][T21576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2132.922312][T21576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2132.937763][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2132.947147][ T3972] bridge0: port 1(bridge_slave_0) entered disabled state [ 2132.955732][ T3972] bridge0: port 2(bridge_slave_1) entered disabled state [ 2132.979736][T21576] 8021q: adding VLAN 0 to HW filter on device team0 [ 2132.993463][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2133.003159][ T3972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2133.010353][ T3972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2133.037520][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2133.047158][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2133.054331][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2133.063512][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2133.073304][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2133.090321][T21576] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2133.101626][T21576] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2133.114957][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2133.123103][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2133.132766][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2133.155622][T21576] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2133.163723][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:47:10 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@ipv4={[], [], @loopback}, 0x4, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffff090}, 0x20) syz_execute_func(&(0x7f0000000a40)="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") ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0216914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0416914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:10 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0a16914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:10 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc41123c9250319bd070") syz_execute_func(&(0x7f0000000180)="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") write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x96ae, 0x37a, 0x3, 0x1ff, 0x62, 0x3, 0x3, 0x100, 0x34c, 0x40, 0x2ac, 0x3, 0x1, 0x38, 0x2, 0x3, 0x6, 0x1}, [{0x70000000, 0x7, 0x1, 0xfff, 0x5, 0xfed, 0x1}, {0x7, 0x3, 0x8, 0x4d, 0x1, 0x7, 0x3df5, 0x1d}], "fe2f0d40e6926b9066ba1e5ac85025735fed7d48871f2f09287278efa4d16b85974f1b92dc139ad28dceb421f2c3819494338a3c0f378ebfe0847dc63993daf74c90630fa4ea5280610302b13e62485dcecfc726cec7f8b60e9634460e19fb6631ace43fd36799a65f9aac9973df254103431a88efecd84b634243b39560850e744189aab7fdca92fdd0a80736662951", [[]]}, 0x240) 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0e16914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0f16914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:10 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2e0000001a0000009da6ad34679b1e7409bf4a28b40085e48655d21c954cef28072c98deac11a2c3123af2fd3ee2"], 0x200) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f6016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879028cd900800030", 0x2e}], 0x1}, 0x0) [ 2138.074664][ T7] device bridge_slave_1 left promiscuous mode [ 2138.080953][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2138.134854][ T7] device bridge_slave_0 left promiscuous mode [ 2138.141092][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2139.846872][ T7] device hsr_slave_1 left promiscuous mode [ 2139.917345][ T7] device hsr_slave_0 left promiscuous mode [ 2139.979238][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2139.991395][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2140.003223][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2140.060278][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2140.140932][ T7] bond0 (unregistering): Released all slaves [ 2140.232012][T22326] IPVS: ftp: loaded support on port[0] = 21 [ 2140.295526][T22326] chnl_net:caif_netlink_parms(): no params data found [ 2140.338042][T22326] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.345384][T22326] bridge0: port 1(bridge_slave_0) entered disabled state [ 2140.353298][T22326] device bridge_slave_0 entered promiscuous mode [ 2140.361523][T22326] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.368999][T22326] bridge0: port 2(bridge_slave_1) entered disabled state [ 2140.377213][T22326] device bridge_slave_1 entered promiscuous mode [ 2140.397885][T22326] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2140.408572][T22326] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2140.432018][T22326] team0: Port device team_slave_0 added [ 2140.440173][T22326] team0: Port device team_slave_1 added [ 2140.506006][T22326] device hsr_slave_0 entered promiscuous mode [ 2140.544143][T22326] device hsr_slave_1 entered promiscuous mode [ 2140.654344][T22326] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.661493][T22326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2140.669090][T22326] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.676273][T22326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2140.735605][T22326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2140.759916][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2140.775616][ T3972] bridge0: port 1(bridge_slave_0) entered disabled state [ 2140.789735][ T3972] bridge0: port 2(bridge_slave_1) entered disabled state [ 2140.805640][T22326] 8021q: adding VLAN 0 to HW filter on device team0 [ 2140.825910][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2140.841464][ T3972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.848753][ T3972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2140.881496][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2140.890940][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.898235][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2140.931382][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2140.941132][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2140.957351][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2140.978013][T22326] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2140.996832][T22326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2141.010361][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2141.021902][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2141.050971][T22326] 8021q: adding VLAN 0 to HW filter on device batadv0 01:47:17 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'bond0\x00', {0x2, 0x4e24, @multicast2}}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x6, {{0x2, 0x4e21, @local}}}, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879048cd900800030", 0x2e}], 0x1}, 0x0) 01:47:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f00169148790a8cd900800030", 0x2e}], 0x1}, 0x0) 01:47:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x16, &(0x7f00000002c0)='!vboxnet1keyring/GPL!\x00'}, 0x30) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x4, 0x1f78, 0x0, 0x800, 0x0, 0x5, 0x32a00, 0x2ece4065d57889f9, 0x7fff, 0xffff, 0x64f, 0x1, 0x9, 0x6, 0x1, 0x4, 0x9, 0x9, 0x200, 0x2, 0x6, 0xff, 0xfffffffffffffffe, 0x10000, 0x81, 0x100, 0x1, 0x1, 0x6, 0x6, 0x0, 0x61c, 0x1ff, 0x7, 0xc, 0x5, 0x0, 0x100000000, 0x6, @perf_bp={&(0x7f00000000c0), 0x8}, 0x40, 0x1000, 0x401, 0x3, 0x3, 0xa903, 0x96c}, r2, 0xd, r1, 0x1) syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) 01:47:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f00169148790e8cd900800030", 0x2e}], 0x1}, 0x0) 01:47:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept$nfc_llcp(r0, 0x0, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f00169148790f8cd900800030", 0x2e}], 0x1}, 0x0) 01:47:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) syz_execute_func(&(0x7f0000000180)="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") 01:47:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879608cd900800030", 0x2e}], 0x1}, 0x0) 01:47:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="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") 01:47:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd902800030", 0x2e}], 0x1}, 0x0) [ 2145.634515][ T7] device bridge_slave_1 left promiscuous mode [ 2145.640782][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2145.694818][ T7] device bridge_slave_0 left promiscuous mode [ 2145.701128][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2147.466847][ T7] device hsr_slave_1 left promiscuous mode [ 2147.509616][ T7] device hsr_slave_0 left promiscuous mode [ 2147.569207][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2147.581098][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2147.592868][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2147.631243][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2147.731292][ T7] bond0 (unregistering): Released all slaves [ 2147.830569][T23044] IPVS: ftp: loaded support on port[0] = 21 [ 2147.892623][T23044] chnl_net:caif_netlink_parms(): no params data found [ 2147.927060][T23044] bridge0: port 1(bridge_slave_0) entered blocking state [ 2147.934367][T23044] bridge0: port 1(bridge_slave_0) entered disabled state [ 2147.942085][T23044] device bridge_slave_0 entered promiscuous mode [ 2147.950231][T23044] bridge0: port 2(bridge_slave_1) entered blocking state [ 2147.957821][T23044] bridge0: port 2(bridge_slave_1) entered disabled state [ 2147.966837][T23044] device bridge_slave_1 entered promiscuous mode [ 2147.987283][T23044] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2147.999458][T23044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2148.021446][T23044] team0: Port device team_slave_0 added [ 2148.032245][T23044] team0: Port device team_slave_1 added [ 2148.086609][T23044] device hsr_slave_0 entered promiscuous mode [ 2148.124116][T23044] device hsr_slave_1 entered promiscuous mode [ 2148.213896][T23044] bridge0: port 2(bridge_slave_1) entered blocking state [ 2148.221116][T23044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2148.228566][T23044] bridge0: port 1(bridge_slave_0) entered blocking state [ 2148.235740][T23044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2148.282036][T23044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2148.299205][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2148.308644][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2148.318035][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2148.332156][T23044] 8021q: adding VLAN 0 to HW filter on device team0 [ 2148.345199][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2148.355023][ T4088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2148.362151][ T4088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2148.385013][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2148.395263][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2148.402454][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2148.417712][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2148.441883][T23044] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2148.452800][T23044] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2148.467161][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2148.481876][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2148.492348][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2148.508565][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2148.533117][T23044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2148.542184][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:47:25 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd904800030", 0x2e}], 0x1}, 0x0) 01:47:25 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100400001, 0x4) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000480)={0x3}, 0x4) r1 = semget(0x0, 0x0, 0x2012) semctl$SETVAL(r1, 0x3, 0x10, &(0x7f0000000140)=0x800) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000004c0), &(0x7f0000000540)=0x60) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") setsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f00000002c0)={@empty, @remote, @dev={0xac, 0x14, 0x14, 0x22}}, 0xc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0xe3e1, 0x5, 0x3, {0x0, 0x1c9c380}, 0x5, 0x8000}) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000300)={0x0, 0x3}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000005c0)=r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4608}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r2, 0x20, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4084}, 0x10) 01:47:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd90a800030", 0x2e}], 0x1}, 0x0) 01:47:25 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0ff6a4ea70db00cb0000383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f000000335fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x1, 0x56c, 0x7ff, 'queue0\x00', 0xb97}) 01:47:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd90e800030", 0x2e}], 0x1}, 0x0) 01:47:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd90f800030", 0x2e}], 0x1}, 0x0) 01:47:26 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x1, 0x3e) syz_execute_func(&(0x7f0000000400)="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") 01:47:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd960800030", 0x2e}], 0x1}, 0x0) 01:47:26 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000002c0)={r3, 0x80000, r0}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd90080002e", 0x2e}], 0x1}, 0x0) 01:47:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800230", 0x2e}], 0x1}, 0x0) [ 2153.744311][ T6832] device bridge_slave_1 left promiscuous mode [ 2153.751005][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 2153.794724][ T6832] device bridge_slave_0 left promiscuous mode [ 2153.800943][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 2155.496679][ T6832] device hsr_slave_1 left promiscuous mode [ 2155.559331][ T6832] device hsr_slave_0 left promiscuous mode [ 2155.627429][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 2155.643417][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 2155.657286][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2155.740271][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2155.835119][ T6832] bond0 (unregistering): Released all slaves [ 2155.942038][T23701] IPVS: ftp: loaded support on port[0] = 21 [ 2156.011420][T23701] chnl_net:caif_netlink_parms(): no params data found [ 2156.052026][T23701] bridge0: port 1(bridge_slave_0) entered blocking state [ 2156.059362][T23701] bridge0: port 1(bridge_slave_0) entered disabled state [ 2156.067632][T23701] device bridge_slave_0 entered promiscuous mode [ 2156.075799][T23701] bridge0: port 2(bridge_slave_1) entered blocking state [ 2156.082961][T23701] bridge0: port 2(bridge_slave_1) entered disabled state [ 2156.090824][T23701] device bridge_slave_1 entered promiscuous mode [ 2156.113230][T23701] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2156.123774][T23701] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2156.145903][T23701] team0: Port device team_slave_0 added [ 2156.152876][T23701] team0: Port device team_slave_1 added [ 2156.205955][T23701] device hsr_slave_0 entered promiscuous mode [ 2156.263942][T23701] device hsr_slave_1 entered promiscuous mode [ 2156.324209][T23701] bridge0: port 2(bridge_slave_1) entered blocking state [ 2156.331357][T23701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2156.338828][T23701] bridge0: port 1(bridge_slave_0) entered blocking state [ 2156.345964][T23701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2156.418594][T23701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2156.434798][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2156.445283][ T3972] bridge0: port 1(bridge_slave_0) entered disabled state [ 2156.453692][ T3972] bridge0: port 2(bridge_slave_1) entered disabled state [ 2156.480041][T23701] 8021q: adding VLAN 0 to HW filter on device team0 [ 2156.492188][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2156.501330][ T3972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2156.508524][ T3972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2156.525843][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2156.534754][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2156.541943][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2156.564990][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2156.574054][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2156.582721][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2156.597101][T23701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2156.610088][T23701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2156.618695][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2156.630016][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2156.654586][T23701] 8021q: adding VLAN 0 to HW filter on device batadv0 01:47:33 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:33 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x100000000000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x32adb40b, 0x4}) syz_execute_func(&(0x7f0000000180)="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") 01:47:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800430", 0x2e}], 0x1}, 0x0) 01:47:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800a30", 0x2e}], 0x1}, 0x0) 01:47:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800e30", 0x2e}], 0x1}, 0x0) 01:47:33 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x802) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000e5ccb9ab0000feb8eff500"]) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800f30", 0x2e}], 0x1}, 0x0) 01:47:33 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x8, [0x654b, 0x1ff, 0xd2c, 0x7fffffff, 0xc0, 0x3, 0x40, 0xf7f7]}, 0x14) 01:47:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900806030", 0x2e}], 0x1}, 0x0) 01:47:33 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) ioctl(r1, 0xfffffffffffff735, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000002c0)=""/4096) syz_execute_func(&(0x7f0000000180)="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") 01:47:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd90080002e", 0x2e}], 0x1}, 0x0) 01:47:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0xf}], 0x1}, 0x0) [ 2161.554245][ T7] device bridge_slave_1 left promiscuous mode [ 2161.560547][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2161.614716][ T7] device bridge_slave_0 left promiscuous mode [ 2161.621857][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2163.316634][ T7] device hsr_slave_1 left promiscuous mode [ 2163.379342][ T7] device hsr_slave_0 left promiscuous mode [ 2163.446862][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2163.458434][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2163.471350][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2163.517325][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2163.620809][ T7] bond0 (unregistering): Released all slaves [ 2163.761628][T24430] IPVS: ftp: loaded support on port[0] = 21 [ 2163.827276][T24430] chnl_net:caif_netlink_parms(): no params data found [ 2163.861953][T24430] bridge0: port 1(bridge_slave_0) entered blocking state [ 2163.869220][T24430] bridge0: port 1(bridge_slave_0) entered disabled state [ 2163.877578][T24430] device bridge_slave_0 entered promiscuous mode [ 2163.885943][T24430] bridge0: port 2(bridge_slave_1) entered blocking state [ 2163.893116][T24430] bridge0: port 2(bridge_slave_1) entered disabled state [ 2163.901021][T24430] device bridge_slave_1 entered promiscuous mode [ 2163.922397][T24430] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2163.933770][T24430] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2163.952403][T24430] team0: Port device team_slave_0 added [ 2163.961246][T24430] team0: Port device team_slave_1 added [ 2164.026558][T24430] device hsr_slave_0 entered promiscuous mode [ 2164.064206][T24430] device hsr_slave_1 entered promiscuous mode [ 2164.195259][T24430] bridge0: port 2(bridge_slave_1) entered blocking state [ 2164.202373][T24430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2164.209843][T24430] bridge0: port 1(bridge_slave_0) entered blocking state [ 2164.216993][T24430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2164.281861][T24430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2164.303003][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2164.319407][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2164.330105][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2164.350933][T24430] 8021q: adding VLAN 0 to HW filter on device team0 [ 2164.363462][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2164.372803][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2164.379999][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2164.398294][ T3972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2164.407406][ T3972] bridge0: port 2(bridge_slave_1) entered blocking state [ 2164.414557][ T3972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2164.455249][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2164.470909][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2164.480214][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2164.496068][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2164.510869][T24430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2164.521733][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2164.560129][T24430] 8021q: adding VLAN 0 to HW filter on device batadv0 01:47:41 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:41 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x302) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @multicast1}}, 0x1e) syz_execute_func(&(0x7f0000000180)="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") 01:47:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x14}], 0x1}, 0x0) 01:47:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x30}], 0x1}, 0x0) 01:47:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0xc0}], 0x1}, 0x0) 01:47:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800f30", 0x2e}], 0x1}, 0x0) 01:47:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x223}], 0x1}, 0x0) 01:47:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0xec0}], 0x1}, 0x0) 01:47:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x33fe0}], 0x1}, 0x0) 01:47:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2168.914271][ T7] device bridge_slave_1 left promiscuous mode [ 2168.920638][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2168.974969][ T7] device bridge_slave_0 left promiscuous mode [ 2168.981233][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2170.676778][ T7] device hsr_slave_1 left promiscuous mode [ 2170.719329][ T7] device hsr_slave_0 left promiscuous mode [ 2170.778618][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2170.790357][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2170.802079][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2170.840618][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2170.952353][ T7] bond0 (unregistering): Released all slaves [ 2171.062044][T24841] IPVS: ftp: loaded support on port[0] = 21 [ 2171.127723][T24841] chnl_net:caif_netlink_parms(): no params data found [ 2171.166284][T24841] bridge0: port 1(bridge_slave_0) entered blocking state [ 2171.173490][T24841] bridge0: port 1(bridge_slave_0) entered disabled state [ 2171.181444][T24841] device bridge_slave_0 entered promiscuous mode [ 2171.189671][T24841] bridge0: port 2(bridge_slave_1) entered blocking state [ 2171.196936][T24841] bridge0: port 2(bridge_slave_1) entered disabled state [ 2171.205083][T24841] device bridge_slave_1 entered promiscuous mode [ 2171.226143][T24841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2171.236281][T24841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2171.257205][T24841] team0: Port device team_slave_0 added [ 2171.264612][T24841] team0: Port device team_slave_1 added [ 2171.316332][T24841] device hsr_slave_0 entered promiscuous mode [ 2171.364097][T24841] device hsr_slave_1 entered promiscuous mode [ 2171.493035][T24841] bridge0: port 2(bridge_slave_1) entered blocking state [ 2171.500205][T24841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2171.507703][T24841] bridge0: port 1(bridge_slave_0) entered blocking state [ 2171.514857][T24841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2171.550844][T24841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2171.566523][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2171.576979][ T4308] bridge0: port 1(bridge_slave_0) entered disabled state [ 2171.585426][ T4308] bridge0: port 2(bridge_slave_1) entered disabled state [ 2171.609658][T24841] 8021q: adding VLAN 0 to HW filter on device team0 [ 2171.621753][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2171.634536][ T3976] bridge0: port 1(bridge_slave_0) entered blocking state [ 2171.641665][ T3976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2171.664525][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2171.673130][ T3976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2171.680342][ T3976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2171.690398][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2171.710102][T24841] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2171.721375][T24841] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2171.734740][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2171.743076][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2171.754031][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2171.766018][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2171.785602][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2171.796470][T24841] 8021q: adding VLAN 0 to HW filter on device batadv0 01:47:48 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x200001ae}], 0x1}, 0x0) 01:47:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x7ffff000}], 0x1}, 0x0) 01:47:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0xfffffdef}], 0x1}, 0x0) 01:47:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x2}, 0x0) 01:47:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x4}, 0x0) 01:47:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2176.754657][T11867] device bridge_slave_1 left promiscuous mode [ 2176.761539][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2176.814904][T11867] device bridge_slave_0 left promiscuous mode [ 2176.821494][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2178.566770][T11867] device hsr_slave_1 left promiscuous mode [ 2178.607177][T11867] device hsr_slave_0 left promiscuous mode [ 2178.668212][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2178.681879][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2178.693383][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2178.750926][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2178.851316][T11867] bond0 (unregistering): Released all slaves [ 2178.942018][T25196] IPVS: ftp: loaded support on port[0] = 21 [ 2179.009158][T25196] chnl_net:caif_netlink_parms(): no params data found [ 2179.052676][T25196] bridge0: port 1(bridge_slave_0) entered blocking state [ 2179.059948][T25196] bridge0: port 1(bridge_slave_0) entered disabled state [ 2179.068219][T25196] device bridge_slave_0 entered promiscuous mode [ 2179.076472][T25196] bridge0: port 2(bridge_slave_1) entered blocking state [ 2179.084339][T25196] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.092336][T25196] device bridge_slave_1 entered promiscuous mode [ 2179.112784][T25196] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2179.123698][T25196] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2179.141794][T25196] team0: Port device team_slave_0 added [ 2179.149362][T25196] team0: Port device team_slave_1 added [ 2179.236461][T25196] device hsr_slave_0 entered promiscuous mode [ 2179.284026][T25196] device hsr_slave_1 entered promiscuous mode [ 2179.347719][T25196] bridge0: port 2(bridge_slave_1) entered blocking state [ 2179.354883][T25196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2179.362197][T25196] bridge0: port 1(bridge_slave_0) entered blocking state [ 2179.369390][T25196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2179.454592][T25196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2179.467108][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2179.476475][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2179.494538][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.517545][T25196] 8021q: adding VLAN 0 to HW filter on device team0 [ 2179.531288][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2179.540534][ T4039] bridge0: port 1(bridge_slave_0) entered blocking state [ 2179.547707][ T4039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2179.567204][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2179.580890][ T4039] bridge0: port 2(bridge_slave_1) entered blocking state [ 2179.588095][ T4039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2179.620876][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2179.631911][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2179.659404][T25196] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2179.677071][T25196] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2179.692286][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2179.701637][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2179.710941][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2179.732454][T25196] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2179.740867][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:47:56 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:47:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x8}, 0x0) 01:47:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x10}, 0x0) 01:47:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0xffffff1f}, 0x0) 01:47:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x2}, 0x0) 01:47:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:47:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x4}, 0x0) 01:47:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2184.524520][T11867] device bridge_slave_1 left promiscuous mode [ 2184.530820][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2184.584793][T11867] device bridge_slave_0 left promiscuous mode [ 2184.591082][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2186.366802][T11867] device hsr_slave_1 left promiscuous mode [ 2186.437136][T11867] device hsr_slave_0 left promiscuous mode [ 2186.489461][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2186.501489][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2186.515025][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2186.548121][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2186.631730][T11867] bond0 (unregistering): Released all slaves [ 2186.774651][T25549] IPVS: ftp: loaded support on port[0] = 21 [ 2186.840258][T25549] chnl_net:caif_netlink_parms(): no params data found [ 2186.873154][T25549] bridge0: port 1(bridge_slave_0) entered blocking state [ 2186.880569][T25549] bridge0: port 1(bridge_slave_0) entered disabled state [ 2186.888781][T25549] device bridge_slave_0 entered promiscuous mode [ 2186.897352][T25549] bridge0: port 2(bridge_slave_1) entered blocking state [ 2186.904636][T25549] bridge0: port 2(bridge_slave_1) entered disabled state [ 2186.912373][T25549] device bridge_slave_1 entered promiscuous mode [ 2186.937561][T25549] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2186.948738][T25549] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2186.968933][T25549] team0: Port device team_slave_0 added [ 2186.976400][T25549] team0: Port device team_slave_1 added [ 2187.045498][T25549] device hsr_slave_0 entered promiscuous mode [ 2187.084180][T25549] device hsr_slave_1 entered promiscuous mode [ 2187.156199][T25549] bridge0: port 2(bridge_slave_1) entered blocking state [ 2187.163404][T25549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2187.170881][T25549] bridge0: port 1(bridge_slave_0) entered blocking state [ 2187.178002][T25549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2187.212273][T25549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2187.228131][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2187.237725][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2187.245956][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2187.259208][T25549] 8021q: adding VLAN 0 to HW filter on device team0 [ 2187.273025][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2187.281716][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2187.289075][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2187.331794][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2187.341396][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2187.348882][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2187.370258][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2187.384788][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2187.393081][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2187.419854][T25549] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2187.437559][T25549] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2187.453239][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2187.469393][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2187.496629][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2187.514336][T25549] 8021q: adding VLAN 0 to HW filter on device batadv0 01:48:04 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xa}, 0x0) 01:48:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xe}, 0x0) 01:48:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf}, 0x0) 01:48:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x60}, 0x0) 01:48:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf0}, 0x0) 01:48:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) [ 2192.394431][ T6832] device bridge_slave_1 left promiscuous mode [ 2192.400670][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 2192.434769][ T6832] device bridge_slave_0 left promiscuous mode [ 2192.440995][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 2194.146788][ T6832] device hsr_slave_1 left promiscuous mode [ 2194.217030][ T6832] device hsr_slave_0 left promiscuous mode [ 2194.289201][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 2194.300848][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 2194.312594][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2194.351463][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2194.451341][ T6832] bond0 (unregistering): Released all slaves [ 2194.552480][T25890] IPVS: ftp: loaded support on port[0] = 21 [ 2194.619135][T25890] chnl_net:caif_netlink_parms(): no params data found [ 2194.657760][T25890] bridge0: port 1(bridge_slave_0) entered blocking state [ 2194.665770][T25890] bridge0: port 1(bridge_slave_0) entered disabled state [ 2194.673497][T25890] device bridge_slave_0 entered promiscuous mode [ 2194.681675][T25890] bridge0: port 2(bridge_slave_1) entered blocking state [ 2194.689084][T25890] bridge0: port 2(bridge_slave_1) entered disabled state [ 2194.697050][T25890] device bridge_slave_1 entered promiscuous mode [ 2194.717510][T25890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2194.730162][T25890] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2194.751153][T25890] team0: Port device team_slave_0 added [ 2194.758934][T25890] team0: Port device team_slave_1 added [ 2194.785998][T25890] device hsr_slave_0 entered promiscuous mode [ 2194.824058][T25890] device hsr_slave_1 entered promiscuous mode [ 2194.924543][T25890] bridge0: port 2(bridge_slave_1) entered blocking state [ 2194.931852][T25890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2194.939293][T25890] bridge0: port 1(bridge_slave_0) entered blocking state [ 2194.946418][T25890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2194.989229][T25890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2195.005155][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2195.014383][T14088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2195.022429][T14088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2195.037988][T25890] 8021q: adding VLAN 0 to HW filter on device team0 [ 2195.050538][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2195.061283][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2195.068481][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2195.096520][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2195.106420][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2195.113675][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2195.123105][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2195.132797][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2195.144400][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2195.160500][T25890] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2195.171667][T25890] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2195.191460][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2195.202168][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2195.230097][T25890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2195.239834][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:48:11 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xa00}, 0x0) 01:48:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xe00}, 0x0) 01:48:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xec0}, 0x0) 01:48:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf00}, 0x0) 01:48:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x23f6}, 0x0) 01:48:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x3f00}, 0x0) [ 2199.624537][T11867] device bridge_slave_1 left promiscuous mode [ 2199.630799][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.684782][T11867] device bridge_slave_0 left promiscuous mode [ 2199.691013][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.415557][T11867] device hsr_slave_1 left promiscuous mode [ 2201.469367][T11867] device hsr_slave_0 left promiscuous mode [ 2201.528967][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2201.540722][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2201.552213][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2201.617728][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2201.750237][T11867] bond0 (unregistering): Released all slaves [ 2201.820824][T26202] IPVS: ftp: loaded support on port[0] = 21 [ 2201.888578][T26202] chnl_net:caif_netlink_parms(): no params data found [ 2201.926677][T26202] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.934738][T26202] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.942421][T26202] device bridge_slave_0 entered promiscuous mode [ 2201.957215][T26202] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.965719][T26202] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.973395][T26202] device bridge_slave_1 entered promiscuous mode [ 2201.991756][T26202] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2202.060374][T26202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2202.077254][T26202] team0: Port device team_slave_0 added [ 2202.084469][T26202] team0: Port device team_slave_1 added [ 2202.136410][T26202] device hsr_slave_0 entered promiscuous mode [ 2202.184089][T26202] device hsr_slave_1 entered promiscuous mode [ 2202.249988][T26202] bridge0: port 2(bridge_slave_1) entered blocking state [ 2202.257158][T26202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2202.264595][T26202] bridge0: port 1(bridge_slave_0) entered blocking state [ 2202.271719][T26202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2202.348212][T26202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2202.371085][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2202.383032][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2202.398824][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2202.422067][T26202] 8021q: adding VLAN 0 to HW filter on device team0 [ 2202.441634][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2202.459224][ T4088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2202.466395][ T4088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2202.500676][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2202.510153][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2202.517326][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2202.532843][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2202.552773][T26202] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2202.570255][T26202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2202.583440][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2202.598605][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2202.624636][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2202.633328][ T3976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2202.659817][ T4308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2202.677384][T26202] 8021q: adding VLAN 0 to HW filter on device batadv0 01:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x6000}, 0x0) 01:48:19 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1}, 0x0) 01:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 01:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xc00e}, 0x0) 01:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 01:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf000}, 0x0) 01:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 01:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf623}, 0x0) 01:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x34000}, 0x0) 01:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 01:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x400300}, 0x0) 01:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 2207.014381][ T6832] device bridge_slave_1 left promiscuous mode [ 2207.021341][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 2207.084912][ T6832] device bridge_slave_0 left promiscuous mode [ 2207.091180][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 2208.846310][ T6832] device hsr_slave_1 left promiscuous mode [ 2208.907511][ T6832] device hsr_slave_0 left promiscuous mode [ 2208.967650][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 2208.984093][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 2208.999763][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2209.080303][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2209.174056][ T6832] bond0 (unregistering): Released all slaves [ 2209.312813][T26532] IPVS: ftp: loaded support on port[0] = 21 [ 2209.381047][T26532] chnl_net:caif_netlink_parms(): no params data found [ 2209.418335][T26532] bridge0: port 1(bridge_slave_0) entered blocking state [ 2209.426009][T26532] bridge0: port 1(bridge_slave_0) entered disabled state [ 2209.434347][T26532] device bridge_slave_0 entered promiscuous mode [ 2209.443364][T26532] bridge0: port 2(bridge_slave_1) entered blocking state [ 2209.451445][T26532] bridge0: port 2(bridge_slave_1) entered disabled state [ 2209.459808][T26532] device bridge_slave_1 entered promiscuous mode [ 2209.483229][T26532] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2209.494136][T26532] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2209.513838][T26532] team0: Port device team_slave_0 added [ 2209.523065][T26532] team0: Port device team_slave_1 added [ 2209.576000][T26532] device hsr_slave_0 entered promiscuous mode [ 2209.614145][T26532] device hsr_slave_1 entered promiscuous mode [ 2209.716520][T26532] bridge0: port 2(bridge_slave_1) entered blocking state [ 2209.724777][T26532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2209.732577][T26532] bridge0: port 1(bridge_slave_0) entered blocking state [ 2209.739935][T26532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2209.831635][T26532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2209.859362][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2209.871563][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2209.887074][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2209.910867][T26532] 8021q: adding VLAN 0 to HW filter on device team0 [ 2209.931027][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2209.947531][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2209.955194][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2209.977122][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2209.987124][T14088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2209.994782][T14088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2210.017305][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2210.027149][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2210.036914][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2210.055650][T26532] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2210.068759][T26532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2210.079881][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2210.089285][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2210.117248][T26532] 8021q: adding VLAN 0 to HW filter on device batadv0 01:48:27 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf0ffff}, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 01:48:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x1000000}, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 01:48:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x2000000}, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 01:48:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x4000000}, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 01:48:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xa000000}, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 2215.414415][ T7] device bridge_slave_1 left promiscuous mode [ 2215.421567][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2215.464635][ T7] device bridge_slave_0 left promiscuous mode [ 2215.471313][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2217.256871][ T7] device hsr_slave_1 left promiscuous mode [ 2217.327096][ T7] device hsr_slave_0 left promiscuous mode [ 2217.387102][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2217.400477][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2217.412599][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2217.471569][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2217.573424][ T7] bond0 (unregistering): Released all slaves [ 2217.671793][T26900] IPVS: ftp: loaded support on port[0] = 21 [ 2217.748451][T26900] chnl_net:caif_netlink_parms(): no params data found [ 2217.784779][T26900] bridge0: port 1(bridge_slave_0) entered blocking state [ 2217.791940][T26900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2217.800094][T26900] device bridge_slave_0 entered promiscuous mode [ 2217.808142][T26900] bridge0: port 2(bridge_slave_1) entered blocking state [ 2217.815488][T26900] bridge0: port 2(bridge_slave_1) entered disabled state [ 2217.823163][T26900] device bridge_slave_1 entered promiscuous mode [ 2217.842993][T26900] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2217.853623][T26900] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2217.871779][T26900] team0: Port device team_slave_0 added [ 2217.879303][T26900] team0: Port device team_slave_1 added [ 2217.936502][T26900] device hsr_slave_0 entered promiscuous mode [ 2217.984103][T26900] device hsr_slave_1 entered promiscuous mode [ 2218.113891][T26900] bridge0: port 2(bridge_slave_1) entered blocking state [ 2218.121004][T26900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2218.128464][T26900] bridge0: port 1(bridge_slave_0) entered blocking state [ 2218.135638][T26900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2218.186266][T26900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2218.202789][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2218.212248][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2218.227678][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2218.248872][T26900] 8021q: adding VLAN 0 to HW filter on device team0 [ 2218.267849][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2218.281124][ T2453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2218.288341][ T2453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2218.322479][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2218.331809][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2218.338995][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2218.371131][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2218.380666][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2218.396662][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2218.416512][T26900] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2218.433181][T26900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2218.447870][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2218.458599][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2218.483064][T26900] 8021q: adding VLAN 0 to HW filter on device batadv0 01:48:35 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xe000000}, 0x0) 01:48:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 01:48:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1}, 0x0) 01:48:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf000000}, 0x0) 01:48:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1}, 0x0) 01:48:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x3f000000}, 0x0) 01:48:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1}, 0x0) 01:48:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x60000000}, 0x0) 01:48:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4", 0x17}], 0x1}, 0x0) 01:48:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x9effffff}, 0x0) 01:48:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4", 0x17}], 0x1}, 0x0) [ 2223.104547][T11867] device bridge_slave_1 left promiscuous mode [ 2223.110805][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2223.164796][T11867] device bridge_slave_0 left promiscuous mode [ 2223.171538][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2224.877523][T11867] device hsr_slave_1 left promiscuous mode [ 2224.939910][T11867] device hsr_slave_0 left promiscuous mode [ 2224.987176][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2225.000659][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2225.012690][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2225.068022][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2225.147505][T11867] bond0 (unregistering): Released all slaves [ 2225.230518][T27241] IPVS: ftp: loaded support on port[0] = 21 [ 2225.295358][T27241] chnl_net:caif_netlink_parms(): no params data found [ 2225.329686][T27241] bridge0: port 1(bridge_slave_0) entered blocking state [ 2225.336964][T27241] bridge0: port 1(bridge_slave_0) entered disabled state [ 2225.345068][T27241] device bridge_slave_0 entered promiscuous mode [ 2225.353074][T27241] bridge0: port 2(bridge_slave_1) entered blocking state [ 2225.360398][T27241] bridge0: port 2(bridge_slave_1) entered disabled state [ 2225.368386][T27241] device bridge_slave_1 entered promiscuous mode [ 2225.389798][T27241] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2225.400411][T27241] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2225.420392][T27241] team0: Port device team_slave_0 added [ 2225.428019][T27241] team0: Port device team_slave_1 added [ 2225.508571][T27241] device hsr_slave_0 entered promiscuous mode [ 2225.564240][T27241] device hsr_slave_1 entered promiscuous mode [ 2225.632265][T27241] bridge0: port 2(bridge_slave_1) entered blocking state [ 2225.639529][T27241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2225.647006][T27241] bridge0: port 1(bridge_slave_0) entered blocking state [ 2225.654131][T27241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2225.720850][T27241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2225.732707][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2225.751505][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 2225.760117][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 2225.775792][T27241] 8021q: adding VLAN 0 to HW filter on device team0 [ 2225.789882][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2225.799362][T14088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2225.806547][T14088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2225.826105][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2225.835257][ T2453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2225.842371][ T2453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2225.865231][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2225.875334][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2225.884535][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2225.897019][T27241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2225.909239][T27241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2225.919320][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2225.928375][T14088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2225.953485][T27241] 8021q: adding VLAN 0 to HW filter on device batadv0 01:48:43 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xc00e0000}, 0x0) 01:48:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec4", 0x17}], 0x1}, 0x0) 01:48:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf0ffffff}, 0x0) 01:48:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf6230000}, 0x0) 01:48:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f00", 0x23}], 0x1}, 0x0) 01:48:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xfffff000}, 0x0) 01:48:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f00", 0x23}], 0x1}, 0x0) 01:48:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f00", 0x23}], 0x1}, 0x0) 01:48:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xffffff7f}, 0x0) 01:48:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008c", 0x29}], 0x1}, 0x0) 01:48:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xffffff9e}, 0x0) [ 2231.064638][T11867] device bridge_slave_1 left promiscuous mode [ 2231.070885][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2231.124917][T11867] device bridge_slave_0 left promiscuous mode [ 2231.131243][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2232.836841][T11867] device hsr_slave_1 left promiscuous mode [ 2232.897173][T11867] device hsr_slave_0 left promiscuous mode [ 2232.948749][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2232.960557][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2232.972046][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2233.010657][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2233.112599][T11867] bond0 (unregistering): Released all slaves [ 2233.221853][T27705] IPVS: ftp: loaded support on port[0] = 21 [ 2233.286723][T27705] chnl_net:caif_netlink_parms(): no params data found [ 2233.320387][T27705] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.327818][T27705] bridge0: port 1(bridge_slave_0) entered disabled state [ 2233.336010][T27705] device bridge_slave_0 entered promiscuous mode [ 2233.344022][T27705] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.351228][T27705] bridge0: port 2(bridge_slave_1) entered disabled state [ 2233.359838][T27705] device bridge_slave_1 entered promiscuous mode [ 2233.380016][T27705] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2233.390548][T27705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2233.411036][T27705] team0: Port device team_slave_0 added [ 2233.419016][T27705] team0: Port device team_slave_1 added [ 2233.486569][T27705] device hsr_slave_0 entered promiscuous mode [ 2233.554011][T27705] device hsr_slave_1 entered promiscuous mode [ 2233.646929][T27705] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.654198][T27705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2233.661563][T27705] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.668841][T27705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2233.706105][T27705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2233.721341][ T2453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2233.730413][ T2453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2233.739251][ T2453] bridge0: port 2(bridge_slave_1) entered disabled state [ 2233.786243][T27705] 8021q: adding VLAN 0 to HW filter on device team0 [ 2233.798093][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2233.806640][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.813796][T14083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2233.825323][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2233.834103][T27243] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.841163][T27243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2233.881456][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2233.903264][T27705] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2233.914775][T27705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2233.927857][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2233.937593][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2233.946698][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2233.955863][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2233.981361][T27705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2233.989716][T14083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:48:50 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="984a2ae92c18964c0f05bf03000000c4a37bf0c51d41e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020023020f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e81e704ecdcda2660f38346800c4e3c8295dc14cf3400f595600c104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131c4e3b168de00fbfb3b62") 01:48:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008c", 0x29}], 0x1}, 0x0) 01:48:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xfffffff0}, 0x0) 01:48:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x40030000000000}, 0x0) 01:48:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008c", 0x29}], 0x1}, 0x0) 01:48:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 01:48:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd90080", 0x2c}], 0x1}, 0x0) 01:48:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x100000000000000}, 0x0) 01:48:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x200000000000000}, 0x0) 01:48:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd90080", 0x2c}], 0x1}, 0x0) 01:48:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x400000000000000}, 0x0) 01:48:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd90080", 0x2c}], 0x1}, 0x0) [ 2238.534541][ T2993] device bridge_slave_1 left promiscuous mode [ 2238.540830][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2238.584472][ T2993] device bridge_slave_0 left promiscuous mode [ 2238.590711][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 2240.255615][ T2993] device hsr_slave_1 left promiscuous mode [ 2240.307006][ T2993] device hsr_slave_0 left promiscuous mode [ 2240.367173][ T2993] team0 (unregistering): Port device team_slave_1 removed [ 2240.380668][ T2993] team0 (unregistering): Port device team_slave_0 removed [ 2240.392147][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2240.457685][ T2993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2240.549189][ T2993] bond0 (unregistering): Released all slaves [ 2240.663525][T28122] IPVS: ftp: loaded support on port[0] = 21 [ 2240.726246][T28122] chnl_net:caif_netlink_parms(): no params data found [ 2240.772644][T28122] bridge0: port 1(bridge_slave_0) entered blocking state [ 2240.780822][T28122] bridge0: port 1(bridge_slave_0) entered disabled state [ 2240.788686][T28122] device bridge_slave_0 entered promiscuous mode [ 2240.796897][T28122] bridge0: port 2(bridge_slave_1) entered blocking state [ 2240.804131][T28122] bridge0: port 2(bridge_slave_1) entered disabled state [ 2240.811961][T28122] device bridge_slave_1 entered promiscuous mode [ 2240.832335][T28122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2240.842940][T28122] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2240.870645][T28122] team0: Port device team_slave_0 added [ 2240.878200][T28122] team0: Port device team_slave_1 added [ 2240.936509][T28122] device hsr_slave_0 entered promiscuous mode [ 2240.984053][T28122] device hsr_slave_1 entered promiscuous mode [ 2241.096176][T28122] bridge0: port 2(bridge_slave_1) entered blocking state [ 2241.103382][T28122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2241.110844][T28122] bridge0: port 1(bridge_slave_0) entered blocking state [ 2241.118070][T28122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2241.156014][T28122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2241.172415][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2241.182520][T27243] bridge0: port 1(bridge_slave_0) entered disabled state [ 2241.190968][T27243] bridge0: port 2(bridge_slave_1) entered disabled state [ 2241.227763][T28122] 8021q: adding VLAN 0 to HW filter on device team0 [ 2241.239807][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2241.249549][ T4088] bridge0: port 1(bridge_slave_0) entered blocking state [ 2241.256853][ T4088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2241.292848][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2241.302832][T27243] bridge0: port 2(bridge_slave_1) entered blocking state [ 2241.310042][T27243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2241.325651][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2241.350534][T28122] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2241.361867][T28122] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2241.375271][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2241.385236][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2241.394673][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2241.403276][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2241.424998][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2241.435244][T28122] 8021q: adding VLAN 0 to HW filter on device batadv0 01:48:57 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:48:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xa00000000000000}, 0x0) 01:48:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd9008000", 0x2d}], 0x1}, 0x0) 01:48:57 executing program 2: socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="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") 01:48:57 executing program 1: r0 = creat(&(0x7f0000000880)='./file0\x00', 0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000900)='TIPC\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x300, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x80) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x1c, r1, 0xb00, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x800) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="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") 01:48:57 executing program 0: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x0, {0x2c, 0x0, 0x7}}, 0x14) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="009b945246709ba0386f3c2ef7b81335c41d974a3ffc9900ecc28150db491f0a67b09c123f539a122753ed8f6ba2f8c23c74da"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:48:58 executing program 1: 01:48:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd9008000", 0x2d}], 0x1}, 0x0) 01:48:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) umount2(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) gettid() r1 = syz_open_procfs(0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000100)=0xc) 01:48:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xe00000000000000}, 0x0) 01:48:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, 0x0) 01:48:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec40a002339e00586f9835b3f0016914879008cd9008000", 0x2d}], 0x1}, 0x0) [ 2245.954505][ T6832] device bridge_slave_1 left promiscuous mode [ 2245.960762][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 2246.014769][ T6832] device bridge_slave_0 left promiscuous mode [ 2246.020997][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 2247.746950][ T6832] device hsr_slave_1 left promiscuous mode [ 2247.817091][ T6832] device hsr_slave_0 left promiscuous mode [ 2247.869383][ T6832] team0 (unregistering): Port device team_slave_1 removed [ 2247.881410][ T6832] team0 (unregistering): Port device team_slave_0 removed [ 2247.892929][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2247.957922][ T6832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2248.041105][ T6832] bond0 (unregistering): Released all slaves [ 2248.150510][T28431] IPVS: ftp: loaded support on port[0] = 21 [ 2248.213382][T28431] chnl_net:caif_netlink_parms(): no params data found [ 2248.247247][T28431] bridge0: port 1(bridge_slave_0) entered blocking state [ 2248.254531][T28431] bridge0: port 1(bridge_slave_0) entered disabled state [ 2248.262266][T28431] device bridge_slave_0 entered promiscuous mode [ 2248.270594][T28431] bridge0: port 2(bridge_slave_1) entered blocking state [ 2248.278066][T28431] bridge0: port 2(bridge_slave_1) entered disabled state [ 2248.285990][T28431] device bridge_slave_1 entered promiscuous mode [ 2248.305907][T28431] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2248.316479][T28431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2248.334537][T28431] team0: Port device team_slave_0 added [ 2248.341977][T28431] team0: Port device team_slave_1 added [ 2248.395826][T28431] device hsr_slave_0 entered promiscuous mode [ 2248.444125][T28431] device hsr_slave_1 entered promiscuous mode [ 2248.516983][T28431] bridge0: port 2(bridge_slave_1) entered blocking state [ 2248.524133][T28431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2248.531464][T28431] bridge0: port 1(bridge_slave_0) entered blocking state [ 2248.538678][T28431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2248.576585][T28431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2248.632733][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2248.642845][T27243] bridge0: port 1(bridge_slave_0) entered disabled state [ 2248.651771][T27243] bridge0: port 2(bridge_slave_1) entered disabled state [ 2248.666155][T28431] 8021q: adding VLAN 0 to HW filter on device team0 [ 2248.678820][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2248.687710][T27243] bridge0: port 1(bridge_slave_0) entered blocking state [ 2248.694884][T27243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2248.714793][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2248.723337][ T4088] bridge0: port 2(bridge_slave_1) entered blocking state [ 2248.730534][ T4088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2248.755107][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2248.765596][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2248.774515][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2248.783041][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2248.801026][T28431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2248.812655][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2248.863094][T28431] 8021q: adding VLAN 0 to HW filter on device batadv0 01:49:06 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 01:49:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0xf00000000000000}, 0x0) 01:49:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 01:49:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) 01:49:06 executing program 0: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x17}, 0x56) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x0, {0x2c, 0x0, 0x7}}, 0x14) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="009b945246709ba0386f3c2ef7b81335c41d974a3ffc9900ecc28150db491f0a67b09c123f539a122753ed8f6ba2f8c23c74da"], 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000340)={0x7}, 0x7) 01:49:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0xc0447, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0xfffffffffd, @local}, 0xfffffe9f) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0xfffffffffffffffd, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e22, @multicast2}, 0xffffffffffffff90) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x0, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003740), 0x0, 0x44010) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020000000000000014f5735dcbb5caf21891e1059b9bf90000000000000000"], 0x1f}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1000004) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000100)={0x57, 0x7, 0x1ff, {0x8, 0xbdd2}, {0x40, 0x9}, @cond=[{0x0, 0x6, 0x3, 0x6, 0xeb1, 0x678b}, {0x8, 0x56d902b1, 0x9, 0x200, 0x10001, 0x7}]}) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='.\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L-', 0x3f00}, 0x28, 0x2) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) 01:49:06 executing program 1: pause() syz_execute_func(0x0) syz_execute_func(&(0x7f00000000c0)="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") 01:49:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 01:49:06 executing program 4: 01:49:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002500e1d3e45ae087185082cf04250300a06ec400002339e00586f9835b3f0016914879008cd900800030", 0x2e}], 0x1, 0x0, 0x6000000000000000}, 0x0) 01:49:06 executing program 4: [ 2251.547312][T28704] IPVS: ftp: loaded support on port[0] = 21 01:49:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) dup3(r0, r1, 0x0) [ 2252.131128][T28711] IPVS: ftp: loaded support on port[0] = 21 [ 2254.553116][T28870] IPVS: ftp: loaded support on port[0] = 21 [ 2254.675188][T28870] chnl_net:caif_netlink_parms(): no params data found [ 2254.762033][T28870] bridge0: port 1(bridge_slave_0) entered blocking state [ 2254.769489][T28870] bridge0: port 1(bridge_slave_0) entered disabled state [ 2254.777681][T28870] device bridge_slave_0 entered promiscuous mode [ 2254.846939][T28870] bridge0: port 2(bridge_slave_1) entered blocking state [ 2254.855908][T28870] bridge0: port 2(bridge_slave_1) entered disabled state [ 2254.863857][T28870] device bridge_slave_1 entered promiscuous mode [ 2254.881968][T28870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2254.957065][T28870] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2254.976762][T28870] team0: Port device team_slave_0 added [ 2254.983764][T28870] team0: Port device team_slave_1 added [ 2255.106361][T28870] device hsr_slave_0 entered promiscuous mode [ 2255.134042][T28870] device hsr_slave_1 entered promiscuous mode [ 2255.175166][T11867] device bridge_slave_1 left promiscuous mode [ 2255.181463][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2255.254778][T11867] device bridge_slave_0 left promiscuous mode [ 2255.261027][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2256.966528][T11867] device hsr_slave_1 left promiscuous mode [ 2257.009027][T11867] device hsr_slave_0 left promiscuous mode [ 2257.076845][T11867] team0 (unregistering): Port device team_slave_1 removed [ 2257.088476][T11867] team0 (unregistering): Port device team_slave_0 removed [ 2257.101197][T11867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2257.147288][T11867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2257.242159][T11867] bond0 (unregistering): Released all slaves [ 2257.417532][T28870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2257.428816][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2257.438127][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2257.452276][ T6832] WARNING: CPU: 0 PID: 6832 at net/batman-adv/multicast.c:337 batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.461664][T28870] 8021q: adding VLAN 0 to HW filter on device team0 [ 2257.463907][ T6832] Kernel panic - not syncing: panic_on_warn set ... [ 2257.463935][ T6832] CPU: 0 PID: 6832 Comm: kworker/u4:2 Not tainted 5.1.0-rc7+ #95 [ 2257.463943][ T6832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2257.463963][ T6832] Workqueue: bat_events batadv_mcast_mla_update [ 2257.463970][ T6832] Call Trace: [ 2257.463991][ T6832] dump_stack+0x172/0x1f0 [ 2257.464014][ T6832] ? batadv_mcast_mla_tt_retract+0x2f0/0x3d0 [ 2257.476986][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2257.477216][ T6832] panic+0x2cb/0x65c [ 2257.486194][T27243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2257.495015][ T6832] ? __warn_printk+0xf3/0xf3 [ 2257.495038][ T6832] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.495051][ T6832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2257.495065][ T6832] ? __warn.cold+0x5/0x45 [ 2257.495077][ T6832] ? __warn+0xe8/0x1d0 [ 2257.495093][ T6832] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.495107][ T6832] __warn.cold+0x20/0x45 [ 2257.495130][ T6832] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.502149][T27243] bridge0: port 1(bridge_slave_0) entered blocking state [ 2257.504676][ T6832] report_bug+0x263/0x2b0 [ 2257.504696][ T6832] do_error_trap+0x11b/0x200 [ 2257.504711][ T6832] do_invalid_op+0x37/0x50 [ 2257.504728][ T6832] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.504748][ T6832] invalid_op+0x14/0x20 [ 2257.509106][T27243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2257.515072][ T6832] RIP: 0010:batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.515087][ T6832] Code: bd fd 7c fa 4c 8b 7d c0 4d 85 ff 0f 85 c3 fd ff ff e8 ab fd 7c fa 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 97 fd 7c fa <0f> 0b e9 54 fd ff ff e8 2b 14 b5 fa e9 37 fe ff ff 48 89 df e8 3e [ 2257.515093][ T6832] RSP: 0018:ffff88807e8b7b50 EFLAGS: 00010293 [ 2257.515104][ T6832] RAX: ffff888066f280c0 RBX: 0000000000000001 RCX: ffffffff86f38c6b [ 2257.515111][ T6832] RDX: 0000000000000000 RSI: ffffffff86f38f19 RDI: 0000000000000007 [ 2257.515119][ T6832] RBP: ffff88807e8b7bb0 R08: ffff888066f280c0 R09: 0000000000000003 [ 2257.515135][ T6832] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff88807e8b7c98 [ 2257.538359][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2257.539706][ T6832] R13: ffff88809f819348 R14: 0000000000000000 R15: ffff88807e8b7d08 [ 2257.546479][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2257.551950][ T6832] ? batadv_mcast_mla_tt_retract+0x5b/0x3d0 [ 2257.557464][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2257.560398][ T6832] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2257.567786][ T4039] bridge0: port 2(bridge_slave_1) entered blocking state [ 2257.570629][ T6832] ? br_multicast_list_adjacent+0x144/0x690 [ 2257.576749][ T4039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2257.583670][ T6832] ? __local_bh_enable_ip+0x15a/0x270 [ 2257.583691][ T6832] batadv_mcast_mla_update+0x553/0x1ec0 [ 2257.583715][ T6832] ? batadv_mcast_tvlv_ogm_handler+0x210/0x210 [ 2257.583748][ T6832] process_one_work+0x98e/0x1790 [ 2257.589803][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2257.592686][ T6832] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2257.599615][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2257.603094][ T6832] ? lock_acquire+0x16f/0x3f0 [ 2257.617982][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2257.621047][ T6832] worker_thread+0x98/0xe40 [ 2257.643254][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2257.648354][ T6832] ? trace_hardirqs_on+0x67/0x230 [ 2257.648380][ T6832] kthread+0x357/0x430 [ 2257.648394][ T6832] ? process_one_work+0x1790/0x1790 [ 2257.648406][ T6832] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2257.648421][ T6832] ret_from_fork+0x3a/0x50 [ 2257.649642][ T6832] Kernel Offset: disabled [ 2257.844181][ T6832] Rebooting in 86400 seconds..